INFO: task kworker/1:0:23 blocked for more than 450 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:0 state:D stack:0 pid:23 tgid:23 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:df879d84 r8:00000002 r7:60000113 r6:df879d8c r5:8324a400
r4:8324a400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8324a400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df879e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855bd3c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8324a400 r7:00000000 r6:83018200 r5:00001000 r4:7f0df000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec6b3000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8565978c r4:85659400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8565978c r4:830cd080
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8324a400 r8:830cd0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:830cd080
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:830cd080 r8:8027ed34 r7:df819d50 r6:830cd100 r5:8324a400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf879fb0 to 0xdf879ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:830cb100
INFO: task kworker/1:0:23 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 83344000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
INFO: task kworker/1:2:723 blocked for more than 450 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:2 state:D stack:0 pid:723 tgid:723 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0049d84 r8:00000002 r7:60000113 r6:e0049d8c r5:832ebc00
r4:832ebc00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:832ebc00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0049e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855bd680
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:832ebc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0e3000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec6cb000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85659f8c r4:85659c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85659f8c r4:83b72b80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:832ebc00 r8:83b72bac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:83b72b80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:83b72b80 r8:8027ed34 r7:df96de60 r6:838de900 r5:832ebc00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0049fb0 to 0xe0049ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:83b5b580
INFO: task kworker/1:2:723 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 8347e000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
INFO: task kworker/1:1:3095 blocked for more than 450 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:1 state:D stack:0 pid:3095 tgid:3095 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:df96dd84 r8:00000002 r7:60000013 r6:df96dd8c r5:84376c00
r4:84376c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84376c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df96de08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a737c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84376c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:df9c7000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84b0ff8c r4:84b0fc00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84b0ff8c r4:84611c00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84376c00 r8:84611c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84611c00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84611c00 r8:8027ed34 r7:e0049e60 r6:84611200 r5:84376c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf96dfb0 to 0xdf96dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:843e2080
INFO: task kworker/1:1:3095 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 837a8000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
INFO: task kworker/0:5:3115 blocked for more than 450 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:5 state:D stack:0 pid:3115 tgid:3115 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:df9c1d84 r8:00000002 r7:60000113 r6:df9c1d8c r5:83240c00
r4:83240c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:83240c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9c1e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849045c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:83240c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:df9f1000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84b88b8c r4:84b88800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84b88b8c r4:846b0580
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:83240c00 r8:846b05ac r7:82804d40 r6:dddced40 r5:dddced60
r4:846b0580
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:846b0580 r8:8027ed34 r7:df979e60 r6:846b0500 r5:83240c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf9c1fb0 to 0xdf9c1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a32080
INFO: task kworker/0:5:3115 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 83a5d000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
INFO: task kworker/1:3:3117 blocked for more than 450 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:3 state:D stack:0 pid:3117 tgid:3117 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:df9d1d84 r8:00000002 r7:60000013 r6:df9d1d8c r5:8324c800
r4:8324c800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8324c800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9d1e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85323f40
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8324c800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dff97000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85366f8c r4:85366c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85366f8c r4:84611e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8324c800 r8:84611e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84611e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84611e00 r8:8027ed34 r7:e0049e60 r6:846b0480 r5:8324c800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf9d1fb0 to 0xdf9d1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84612c40
INFO: task kworker/1:3:3117 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 84320000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
INFO: task kworker/0:6:3118 blocked for more than 450 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:6 state:D stack:0 pid:3118 tgid:3118 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:df9c5d84 r8:00000002 r7:60000113 r6:df9c5d8c r5:8324bc00
r4:8324bc00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8324bc00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9c5e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84907c40
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:8324bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb9000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ade78c r4:84ade400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ade78c r4:846b0400
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8324bc00 r8:846b042c r7:82804d40 r6:dddced40 r5:dddced60
r4:846b0400
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:846b0400 r8:8027ed34 r7:df9c1e60 r6:846b0380 r5:8324bc00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf9c5fb0 to 0xdf9c5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a322c0
INFO: task kworker/0:6:3118 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 84321000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
INFO: task kworker/0:7:3119 blocked for more than 450 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:7 state:D stack:0 pid:3119 tgid:3119 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:df9e9d84 r8:00000002 r7:60000113 r6:df9e9d8c r5:8386b000
r4:8386b000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8386b000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9e9e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8494a500
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:8386b000 r7:00000000 r6:83018000 r5:00001000 r4:7f089000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dffef000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ade38c r4:84ade000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ade38c r4:846b0800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8386b000 r8:846b082c r7:82804d40 r6:dddced40 r5:dddced60
r4:846b0800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:846b0800 r8:8027ed34 r7:df9c5e60 r6:846b0880 r5:8386b000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf9e9fb0 to 0xdf9e9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a322c0
INFO: task kworker/0:7:3119 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 84321000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
INFO: task kworker/0:8:3122 blocked for more than 450 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:8 state:D stack:0 pid:3122 tgid:3122 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:df9ddd84 r8:00000002 r7:60000113 r6:df9ddd8c r5:84100000
r4:84100000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84100000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9dde08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850e8b80
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84100000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e06bd000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:83edd38c r4:83edd000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:83edd38c r4:846b0900
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84100000 r8:846b092c r7:82804d40 r6:dddced40 r5:dddced60
r4:846b0900
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:846b0900 r8:8027ed34 r7:df9c5e60 r6:846b0980 r5:84100000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf9ddfb0 to 0xdf9ddff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a32500
INFO: task kworker/0:8:3122 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 84755000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
INFO: task kworker/0:9:3123 blocked for more than 450 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:9 state:D stack:0 pid:3123 tgid:3123 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:df9edd84 r8:00000002 r7:60000113 r6:df9edd8c r5:833d3000
r4:833d3000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:833d3000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9ede08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85015180
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:833d3000 r7:00000000 r6:83018000 r5:00001000 r4:7f065000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc37000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84adf38c r4:84adf000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84adf38c r4:846b0a00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:833d3000 r8:846b0a2c r7:82804d40 r6:dddced40 r5:dddced60
r4:846b0a00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:846b0a00 r8:8027ed34 r7:df9dde60 r6:846b0a80 r5:833d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf9edfb0 to 0xdf9edff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a32440
INFO: task kworker/0:9:3123 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 85720000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
INFO: task kworker/0:10:3125 blocked for more than 450 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:10 state:D stack:0 pid:3125 tgid:3125 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:df9f9d84 r8:00000002 r7:60000113 r6:df9f9d8c r5:832fd400
r4:832fd400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:832fd400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9f9e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f9cc0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:832fd400 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:df9a7000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85111f8c r4:85111c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:85111f8c r4:846b0b00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:832fd400 r8:846b0b2c r7:82804d40 r6:dddced40 r5:dddced60
r4:846b0b00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:846b0b00 r8:8027ed34 r7:df9dde60 r6:846b0b80 r5:832fd400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf9f9fb0 to 0xdf9f9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a32640
INFO: task kworker/0:10:3125 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 857a4000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:11:3127 blocked for more than 450 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:11 state:D stack:0 pid:3127 tgid:3127 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfa11d84 r8:00000002 r7:60000113 r6:dfa11d8c r5:832f8c00
r4:832f8c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:832f8c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa11e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8502ea80
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:832f8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:df97b000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8513a78c r4:8513a400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:8513a78c r4:846b0c00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:832f8c00 r8:846b0c2c r7:82804d40 r6:dddced40 r5:dddced60
r4:846b0c00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:846b0c00 r8:8027ed34 r7:df9f9e60 r6:846b0c80 r5:832f8c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa11fb0 to 0xdfa11ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a32840
INFO: task kworker/0:11:3127 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 858d2000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:12:3129 blocked for more than 450 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:12 state:D stack:0 pid:3129 tgid:3129 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfa21d84 r8:00000002 r7:60000113 r6:dfa21d8c r5:83a86000
r4:83a86000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:83a86000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa21e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8516cb80
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:83a86000 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcd3000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84becf8c r4:84becc00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84becf8c r4:846b0d00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:83a86000 r8:846b0d2c r7:82804d40 r6:dddced40 r5:dddced60
r4:846b0d00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:846b0d00 r8:8027ed34 r7:dfa11e60 r6:84611f80 r5:83a86000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa21fb0 to 0xdfa21ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a32a40
INFO: task kworker/0:12:3129 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 883a4000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:13:3131 blocked for more than 451 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:13 state:D stack:0 pid:3131 tgid:3131 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfa41d84 r8:00000002 r7:60000113 r6:dfa41d8c r5:84376000
r4:84376000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84376000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa41e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85001280
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84376000 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:df9a3000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8518478c r4:85184400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:8518478c r4:846b0d80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84376000 r8:846b0dac r7:82804d40 r6:dddced40 r5:dddced60
r4:846b0d80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:846b0d80 r8:8027ed34 r7:dfa11e60 r6:84611b00 r5:84376000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa41fb0 to 0xdfa41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a32c00
INFO: task kworker/0:13:3131 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 883a4000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:14:3134 blocked for more than 451 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:14 state:D stack:0 pid:3134 tgid:3134 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfa4dd84 r8:00000002 r7:60000113 r6:dfa4dd8c r5:84371800
r4:84371800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84371800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa4de08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850e6740
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84371800 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e03cb000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85185b8c r4:85185800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:85185b8c r4:846b0e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84371800 r8:846b0e2c r7:82804d40 r6:dddced40 r5:dddced60
r4:846b0e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:846b0e00 r8:8027ed34 r7:dfa41e60 r6:84611780 r5:84371800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa4dfb0 to 0xdfa4dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a32e80
INFO: task kworker/0:14:3134 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 88883000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:15:3135 blocked for more than 451 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:15 state:D stack:0 pid:3135 tgid:3135 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfa51d84 r8:00000002 r7:60000113 r6:dfa51d8c r5:83a85400
r4:83a85400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:83a85400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa51e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f5dc0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:83a85400 r7:00000000 r6:83018000 r5:00001000 r4:7f069000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dffc3000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8521338c r4:85213000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:8521338c r4:846b0e80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:83a85400 r8:846b0eac r7:82804d40 r6:dddced40 r5:dddced60
r4:846b0e80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:846b0e80 r8:8027ed34 r7:dfa4de60 r6:84611680 r5:83a85400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa51fb0 to 0xdfa51ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a32e80
INFO: task kworker/0:15:3135 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 88d74000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:16:3137 blocked for more than 451 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:16 state:D stack:0 pid:3137 tgid:3137 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfa65d84 r8:00000002 r7:60000113 r6:dfa65d8c r5:832f5400
r4:832f5400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:832f5400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa65e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3ccc0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:832f5400 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaac1000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85187f8c r4:85187c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:85187f8c r4:846b0f00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:832f5400 r8:846b0f2c r7:82804d40 r6:dddced40 r5:dddced60
r4:846b0f00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:846b0f00 r8:8027ed34 r7:dfa4de60 r6:838a0f00 r5:832f5400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa65fb0 to 0xdfa65ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a42000
INFO: task kworker/0:16:3137 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 88dc3000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:17:3139 blocked for more than 451 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:17 state:D stack:0 pid:3139 tgid:3139 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfa05d84 r8:00000002 r7:60000113 r6:dfa05d8c r5:832fc800
r4:832fc800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:832fc800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa05e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a41780
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:832fc800 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eadb9000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8518678c r4:85186400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:8518678c r4:846b0f80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:832fc800 r8:846b0fac r7:82804d40 r6:dddced40 r5:dddced60
r4:846b0f80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:846b0f80 r8:8027ed34 r7:dfa65e60 r6:846b0200 r5:832fc800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa05fb0 to 0xdfa05ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a42140
INFO: task kworker/0:17:3139 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 88e64000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:18:3142 blocked for more than 451 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:18 state:D stack:0 pid:3142 tgid:3142 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfa71d84 r8:00000002 r7:60000113 r6:dfa71d8c r5:832fec00
r4:832fec00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:832fec00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa71e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3cdc0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:832fec00 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfe63000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85186f8c r4:85186c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:85186f8c r4:846b0180
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:832fec00 r8:846b01ac r7:82804d40 r6:dddced40 r5:dddced60
r4:846b0180
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:846b0180 r8:8027ed34 r7:dfa65e60 r6:846b0780 r5:832fec00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa71fb0 to 0xdfa71ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a423c0
INFO: task kworker/0:18:3142 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 89355000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:19:3144 blocked for more than 451 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:19 state:D stack:0 pid:3144 tgid:3144 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfa7dd84 r8:00000002 r7:60000113 r6:dfa7dd8c r5:832e3000
r4:832e3000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:832e3000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa7de08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8531bf00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:832e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0537000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:853aa38c r4:853aa000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:853aa38c r4:846b0280
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:832e3000 r8:846b02ac r7:82804d40 r6:dddced40 r5:dddced60
r4:846b0280
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:846b0280 r8:8027ed34 r7:dfa65e60 r6:846b0080 r5:832e3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa7dfb0 to 0xdfa7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a424c0
INFO: task kworker/0:19:3144 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 8986c000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:20:3145 blocked for more than 451 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:20 state:D stack:0 pid:3145 tgid:3145 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfa1dd84 r8:00000002 r7:60000013 r6:dfa1dd8c r5:832e6c00
r4:832e6c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:832e6c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa1de08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85343e00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:832e6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f029000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa7f000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:83edfb8c r4:83edf800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:83edfb8c r4:846b0000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:832e6c00 r8:846b002c r7:82804d40 r6:dddced40 r5:dddced60
r4:846b0000
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:846b0000 r8:8027ed34 r7:dfa7de60 r6:830b8780 r5:832e6c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa1dfb0 to 0xdfa1dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a424c0
INFO: task kworker/0:20:3145 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 899e6000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:21:3149 blocked for more than 451 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:21 state:D stack:0 pid:3149 tgid:3149 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfa95d84 r8:00000002 r7:60000113 r6:dfa95d8c r5:840b5400
r4:840b5400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:840b5400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa95e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85337f00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:840b5400 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb2ff000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:853c1f8c r4:853c1c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:853c1f8c r4:830b8680
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:840b5400 r8:830b86ac r7:82804d40 r6:dddced40 r5:dddced60
r4:830b8680
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:830b8680 r8:8027ed34 r7:dfa7de60 r6:841d9980 r5:840b5400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa95fb0 to 0xdfa95ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a42880
INFO: task kworker/0:21:3149 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 89c7b000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:22:3150 blocked for more than 451 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:22 state:D stack:0 pid:3150 tgid:3150 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfaa1d84 r8:00000002 r7:60000113 r6:dfaa1d8c r5:840b3c00
r4:840b3c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:840b3c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaa1e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85316e40
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:840b3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa73000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:853c078c r4:853c0400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:853c078c r4:83c98380
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:840b3c00 r8:83c983ac r7:82804d40 r6:dddced40 r5:dddced60
r4:83c98380
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:83c98380 r8:8027ed34 r7:dfa95e60 r6:830cd400 r5:840b3c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfaa1fb0 to 0xdfaa1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a42880
INFO: task kworker/0:22:3150 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 89f63000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:23:3153 blocked for more than 451 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:23 state:D stack:0 pid:3153 tgid:3153 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfa89d84 r8:00000002 r7:60000113 r6:dfa89d8c r5:840b0c00
r4:840b0c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:840b0c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa89e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4c500
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:840b0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f039000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb027000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:83ee4f8c r4:83ee4c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:83ee4f8c r4:830cd380
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:840b0c00 r8:830cd3ac r7:82804d40 r6:dddced40 r5:dddced60
r4:830cd380
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:830cd380 r8:8027ed34 r7:dfa95e60 r6:830cd300 r5:840b0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa89fb0 to 0xdfa89ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a42cc0
INFO: task kworker/0:23:3153 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 8a20f000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:4:3154 blocked for more than 451 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:4 state:D stack:0 pid:3154 tgid:3154 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfacdd84 r8:00000002 r7:60000013 r6:dfacdd8c r5:840b4800
r4:840b4800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:840b4800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfacde08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855bd580
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:840b4800 r7:00000000 r6:83018200 r5:00001000 r4:7f0e1000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec6bf000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85659b8c r4:85659800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85659b8c r4:8410ed80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:840b4800 r8:8410edac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8410ed80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8410ed80 r8:8027ed34 r7:e0049e60 r6:830cd280 r5:840b4800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfacdfb0 to 0xdfacdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a40900
INFO: task kworker/1:4:3154 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 8ab75000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:24:3155 blocked for more than 451 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:24 state:D stack:0 pid:3155 tgid:3155 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfac1d84 r8:00000002 r7:60000113 r6:dfac1d8c r5:840b6000
r4:840b6000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:840b6000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfac1e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d5800
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:840b6000 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaee3000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8547bf8c r4:8547bc00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:8547bf8c r4:843dc680
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:840b6000 r8:843dc6ac r7:82804d40 r6:dddced40 r5:dddced60
r4:843dc680
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:843dc680 r8:8027ed34 r7:dfa89e60 r6:843dc600 r5:840b6000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfac1fb0 to 0xdfac1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a42d40
INFO: task kworker/0:24:3155 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 8b398000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:25:3156 blocked for more than 451 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:25 state:D stack:0 pid:3156 tgid:3156 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfad9d84 r8:00000002 r7:60000113 r6:dfad9d8c r5:840b0000
r4:840b0000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:840b0000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfad9e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846542c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:840b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa97000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85500b8c r4:85500800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:85500b8c r4:832a0700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:840b0000 r8:832a072c r7:82804d40 r6:dddced40 r5:dddced60
r4:832a0700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:832a0700 r8:8027ed34 r7:dfa89e60 r6:83d23700 r5:840b0000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfad9fb0 to 0xdfad9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a42d80
INFO: task kworker/0:25:3156 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 8b45b000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:26:3160 blocked for more than 451 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:26 state:D stack:0 pid:3160 tgid:3160 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfaf5d84 r8:00000002 r7:60000113 r6:dfaf5d8c r5:842c4800
r4:842c4800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:842c4800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaf5e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8562b500
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:842c4800 r7:00000000 r6:83018000 r5:00001000 r4:7f059000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec401000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85684b8c r4:85684800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:85684b8c r4:832a0200
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:842c4800 r8:832a022c r7:82804d40 r6:dddced40 r5:dddced60
r4:832a0200
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:832a0200 r8:8027ed34 r7:dfad9e60 r6:846feb00 r5:842c4800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfaf5fb0 to 0xdfaf5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a4f000
INFO: task kworker/0:26:3160 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 8b989000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:27:3161 blocked for more than 451 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:27 state:D stack:0 pid:3161 tgid:3161 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfb01d84 r8:00000002 r7:60000013 r6:dfb01d8c r5:842c3c00
r4:842c3c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:842c3c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb01e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855fa4c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:842c3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb553000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8550238c r4:85502000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:8550238c r4:8334ad80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:842c3c00 r8:8334adac r7:82804d40 r6:dddced40 r5:dddced60
r4:8334ad80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8334ad80 r8:8027ed34 r7:dfaf5e60 r6:846fe900 r5:842c3c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfb01fb0 to 0xdfb01ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a4f240
INFO: task kworker/0:27:3161 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 8b989000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:28:3163 blocked for more than 451 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:28 state:D stack:0 pid:3163 tgid:3163 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfab5d84 r8:00000002 r7:60000113 r6:dfab5d8c r5:840b6c00
r4:840b6c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:840b6c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfab5e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8533d400
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:840b6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f099000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec113000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8550338c r4:85503000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:8550338c r4:8334a600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:840b6c00 r8:8334a62c r7:82804d40 r6:dddced40 r5:dddced60
r4:8334a600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8334a600 r8:8027ed34 r7:dfaf5e60 r6:8334ad00 r5:840b6c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfab5fb0 to 0xdfab5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a4f180
INFO: task kworker/0:28:3163 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 8c470000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:29:3165 blocked for more than 451 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:29 state:D stack:0 pid:3165 tgid:3165 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfb11d84 r8:00000002 r7:60000113 r6:dfb11d8c r5:832eec00
r4:832eec00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:832eec00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb11e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850d2880
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:832eec00 r7:00000000 r6:83018000 r5:00001000 r4:7f071000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb7dd000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:83ee638c r4:83ee6000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:83ee638c r4:846a1a00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:832eec00 r8:846a1a2c r7:82804d40 r6:dddced40 r5:dddced60
r4:846a1a00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:846a1a00 r8:8027ed34 r7:dfaf5e60 r6:846a1980 r5:832eec00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfb11fb0 to 0xdfb11ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a4f280
INFO: task kworker/0:29:3165 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 8c470000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:30:3167 blocked for more than 451 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:30 state:D stack:0 pid:3167 tgid:3167 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfb1dd84 r8:00000002 r7:60000113 r6:dfb1dd8c r5:832e8c00
r4:832e8c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:832e8c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb1de08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850d2780
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:832e8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb7a7000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:83ee678c r4:83ee6400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:83ee678c r4:846a1780
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:832e8c00 r8:846a17ac r7:82804d40 r6:dddced40 r5:dddced60
r4:846a1780
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:846a1780 r8:8027ed34 r7:dfaf5e60 r6:846a1800 r5:832e8c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfb1dfb0 to 0xdfb1dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a4f640
INFO: task kworker/0:30:3167 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 8ce71000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:31:3170 blocked for more than 451 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:31 state:D stack:0 pid:3170 tgid:3170 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfb29d84 r8:00000002 r7:60000013 r6:dfb29d8c r5:832e9800
r4:832e9800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:832e9800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb29e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8572c040
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:832e9800 r7:00000000 r6:83018000 r5:00001000 r4:7f0ef000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec567000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8575478c r4:85754400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:8575478c r4:846a1680
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:832e9800 r8:846a16ac r7:82804d40 r6:dddced40 r5:dddced60
r4:846a1680
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:846a1680 r8:8027ed34 r7:dfaf5e60 r6:846a1d80 r5:832e9800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfb29fb0 to 0xdfb29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a4f680
INFO: task kworker/0:31:3170 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 8d818000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:32:3172 blocked for more than 451 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:32 state:D stack:0 pid:3172 tgid:3172 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfb35d84 r8:00000002 r7:60000113 r6:dfb35d8c r5:832eb000
r4:832eb000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:832eb000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb35e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855b0680
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:832eb000 r7:00000000 r6:83018000 r5:00001000 r4:7f095000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eacc9000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85685b8c r4:85685800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:85685b8c r4:846a1f80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:832eb000 r8:846a1fac r7:82804d40 r6:dddced40 r5:dddced60
r4:846a1f80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:846a1f80 r8:8027ed34 r7:dfb29e60 r6:84a5d000 r5:832eb000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfb35fb0 to 0xdfb35ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a4f800
INFO: task kworker/0:32:3172 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 8db6a000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:33:3174 blocked for more than 451 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:33 state:D stack:0 pid:3174 tgid:3174 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfae5d84 r8:00000002 r7:60000013 r6:dfae5d8c r5:832ed400
r4:832ed400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:832ed400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfae5e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84670a00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:832ed400 r7:00000000 r6:83018000 r5:00001000 r4:7f25b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec1f5000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85864f8c r4:85864c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:85864f8c r4:84a5d080
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:832ed400 r8:84a5d0ac r7:82804d40 r6:dddced40 r5:dddced60
r4:84a5d080
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a5d080 r8:8027ed34 r7:dfb29e60 r6:84a5d100 r5:832ed400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfae5fb0 to 0xdfae5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a4f800
INFO: task kworker/0:33:3174 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 8db6a000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:34:3175 blocked for more than 452 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:34 state:D stack:0 pid:3175 tgid:3175 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfb41d84 r8:00000002 r7:60000113 r6:dfb41d8c r5:84928000
r4:84928000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84928000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb41e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dc980
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84928000 r7:00000000 r6:83018000 r5:00001000 r4:7f0eb000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb679000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8578e78c r4:8578e400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:8578e78c r4:84a5d180
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84928000 r8:84a5d1ac r7:82804d40 r6:dddced40 r5:dddced60
r4:84a5d180
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a5d180 r8:8027ed34 r7:dfae5e60 r6:84a5d200 r5:84928000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfb41fb0 to 0xdfb41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a4fb80
INFO: task kworker/0:34:3175 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 8df80000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:35:3179 blocked for more than 452 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:35 state:D stack:0 pid:3179 tgid:3179 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfb4dd84 r8:00000002 r7:60000113 r6:dfb4dd8c r5:84928c00
r4:84928c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84928c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb4de08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8559c7c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84928c00 r7:00000000 r6:83018000 r5:00001000 r4:7f153000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec93f000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8576eb8c r4:8576e800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:8576eb8c r4:84a5d280
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84928c00 r8:84a5d2ac r7:82804d40 r6:dddced40 r5:dddced60
r4:84a5d280
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a5d280 r8:8027ed34 r7:dfae5e60 r6:84a5d300 r5:84928c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfb4dfb0 to 0xdfb4dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a4fb80
INFO: task kworker/0:35:3179 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 8f828000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:36:3181 blocked for more than 452 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:36 state:D stack:0 pid:3181 tgid:3181 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfb59d84 r8:00000002 r7:60000113 r6:dfb59d8c r5:84929800
r4:84929800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84929800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb59e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855b0980
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84929800 r7:00000000 r6:83018000 r5:00001000 r4:7f15b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eae35000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:857acf8c r4:857acc00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:857acf8c r4:84a5d380
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84929800 r8:84a5d3ac r7:82804d40 r6:dddced40 r5:dddced60
r4:84a5d380
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a5d380 r8:8027ed34 r7:dfae5e60 r6:84a5d400 r5:84929800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfb59fb0 to 0xdfb59ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a4fd00
INFO: task kworker/0:36:3181 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 8fde7000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:5:3183 blocked for more than 452 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:5 state:D stack:0 pid:3183 tgid:3183 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfb75d84 r8:00000002 r7:60000113 r6:dfb75d8c r5:8492a400
r4:8492a400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8492a400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb75e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855bdac0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8492a400 r7:00000000 r6:83018200 r5:00001000 r4:7f063000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaf0f000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8565bf8c r4:8565bc00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8565bf8c r4:8449cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8492a400 r8:8449cc2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8449cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8449cc00 r8:8027ed34 r7:e0049e60 r6:84a5d480 r5:8492a400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfb75fb0 to 0xdfb75ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a40bc0
INFO: task kworker/1:5:3183 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 90965000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:6:3185 blocked for more than 452 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:6 state:D stack:0 pid:3185 tgid:3185 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfb69d84 r8:00000002 r7:60000113 r6:dfb69d8c r5:8492b000
r4:8492b000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8492b000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb69e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855bd840
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8492b000 r7:00000000 r6:83018200 r5:00001000 r4:7f0e7000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec6e3000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8565a78c r4:8565a400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8565a78c r4:84a6c000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8492b000 r8:84a6c02c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a6c000
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a6c000 r8:8027ed34 r7:dfb75e60 r6:84a5d500 r5:8492b000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfb69fb0 to 0xdfb69ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a6b000
INFO: task kworker/1:6:3185 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 90a48000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:7:3187 blocked for more than 452 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:7 state:D stack:0 pid:3187 tgid:3187 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfb8dd84 r8:00000002 r7:60000113 r6:dfb8dd8c r5:8492bc00
r4:8492bc00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8492bc00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb8de08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855bda40
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8492bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfacf000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8565af8c r4:8565ac00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8565af8c r4:84a6c080
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8492bc00 r8:84a6c0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a6c080
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a6c080 r8:8027ed34 r7:dfb75e60 r6:84a5d600 r5:8492bc00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfb8dfb0 to 0xdfb8dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a6b1c0
INFO: task kworker/1:7:3187 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 90d36000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:37:3188 blocked for more than 452 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:37 state:D stack:0 pid:3188 tgid:3188 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfb91d84 r8:00000002 r7:60000113 r6:dfb91d8c r5:8492c800
r4:8492c800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8492c800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb91e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8572dd40
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:8492c800 r7:00000000 r6:83018000 r5:00001000 r4:7f20b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec713000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85842b8c r4:85842800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:85842b8c r4:84a5d580
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8492c800 r8:84a5d5ac r7:82804d40 r6:dddced40 r5:dddced60
r4:84a5d580
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a5d580 r8:8027ed34 r7:dfae5e60 r6:84a5d680 r5:8492c800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfb91fb0 to 0xdfb91ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a670c0
INFO: task kworker/0:37:3188 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 90e43000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:38:3190 blocked for more than 452 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:38 state:D stack:0 pid:3190 tgid:3190 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfb81d84 r8:00000002 r7:60000013 r6:dfb81d8c r5:8492d400
r4:8492d400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8492d400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb81e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858bf7c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:8492d400 r7:00000000 r6:83018000 r5:00001000 r4:7f239000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0389000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85842f8c r4:85842c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:85842f8c r4:84a5d700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8492d400 r8:84a5d72c r7:82804d40 r6:dddced40 r5:dddced60
r4:84a5d700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a5d700 r8:8027ed34 r7:dfae5e60 r6:84a5d780 r5:8492d400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfb81fb0 to 0xdfb81ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a674c0
INFO: task kworker/0:38:3190 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 9131b000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:39:3192 blocked for more than 452 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:39 state:D stack:0 pid:3192 tgid:3192 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfb9dd84 r8:00000002 r7:60000113 r6:dfb9dd8c r5:8492e000
r4:8492e000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8492e000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb9de08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858ce040
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:8492e000 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfb71000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8589778c r4:85897400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:8589778c r4:84a5d800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8492e000 r8:84a5d82c r7:82804d40 r6:dddced40 r5:dddced60
r4:84a5d800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a5d800 r8:8027ed34 r7:dfae5e60 r6:84a5d880 r5:8492e000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfb9dfb0 to 0xdfb9dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a67380
INFO: task kworker/0:39:3192 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 913c6000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:8:3193 blocked for more than 452 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:8 state:D stack:0 pid:3193 tgid:3193 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfbb5d84 r8:00000002 r7:60000113 r6:dfbb5d8c r5:8492ec00
r4:8492ec00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8492ec00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbb5e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855bdb40
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8492ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dffff000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8565b38c r4:8565b000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8565b38c r4:84a6c100
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8492ec00 r8:84a6c12c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a6c100
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a6c100 r8:8027ed34 r7:dfb75e60 r6:84a5d900 r5:8492ec00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfbb5fb0 to 0xdfbb5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a6b4c0
INFO: task kworker/1:8:3193 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 91645000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:40:3197 blocked for more than 452 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:40 state:D stack:0 pid:3197 tgid:3197 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfba9d84 r8:00000002 r7:60000113 r6:dfba9d8c r5:84820000
r4:84820000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84820000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfba9e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85732a40
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84820000 r7:00000000 r6:83018000 r5:00001000 r4:7f2ed000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec925000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85968f8c r4:85968c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:85968f8c r4:84a5d980
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84820000 r8:84a5d9ac r7:82804d40 r6:dddced40 r5:dddced60
r4:84a5d980
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a5d980 r8:8027ed34 r7:dfae5e60 r6:84a5da00 r5:84820000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfba9fb0 to 0xdfba9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a67740
INFO: task kworker/0:40:3197 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 91a46000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:41:3199 blocked for more than 452 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:41 state:D stack:0 pid:3199 tgid:3199 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfbcdd84 r8:00000002 r7:60000013 r6:dfbcdd8c r5:84820c00
r4:84820c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84820c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbcde08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858d6d80
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84820c00 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfb99000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85969f8c r4:85969c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:85969f8c r4:84a5da80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84820c00 r8:84a5daac r7:82804d40 r6:dddced40 r5:dddced60
r4:84a5da80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a5da80 r8:8027ed34 r7:dfba9e60 r6:84a5db00 r5:84820c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfbcdfb0 to 0xdfbcdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a678c0
INFO: task kworker/0:41:3199 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 91a46000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:9:3200 blocked for more than 452 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:9 state:D stack:0 pid:3200 tgid:3200 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfbc1d84 r8:00000002 r7:60000113 r6:dfbc1d8c r5:84821800
r4:84821800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84821800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbc1e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855bdc40
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84821800 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eab39000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8565b78c r4:8565b400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8565b78c r4:84a6c180
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84821800 r8:84a6c1ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a6c180
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a6c180 r8:8027ed34 r7:dfb75e60 r6:84a5db80 r5:84821800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfbc1fb0 to 0xdfbc1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a6b540
INFO: task kworker/1:9:3200 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 9224c000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:10:3205 blocked for more than 452 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:10 state:D stack:0 pid:3205 tgid:3205 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfbfdd84 r8:00000002 r7:60000113 r6:dfbfdd8c r5:84823c00
r4:84823c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84823c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbfde08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855bdd40
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84823c00 r7:00000000 r6:83018200 r5:00001000 r4:7f061000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eadb5000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8565bb8c r4:8565b800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8565bb8c r4:84a6c200
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84823c00 r8:84a6c22c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a6c200
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a6c200 r8:8027ed34 r7:dfb75e60 r6:84a5dd00 r5:84823c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfbfdfb0 to 0xdfbfdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a6b980
INFO: task kworker/1:10:3205 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 92281000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:11:3209 blocked for more than 452 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:11 state:D stack:0 pid:3209 tgid:3209 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfc25d84 r8:00000002 r7:60000013 r6:dfc25d8c r5:84825400
r4:84825400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84825400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc25e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c76c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84825400 r7:00000000 r6:83018200 r5:00001000 r4:7f069000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb2f5000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85660b8c r4:85660800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85660b8c r4:84a6c280
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84825400 r8:84a6c2ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a6c280
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a6c280 r8:8027ed34 r7:dfb75e60 r6:84a5de80 r5:84825400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfc25fb0 to 0xdfc25ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a6ba80
INFO: task kworker/1:11:3209 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 92872000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:12:3210 blocked for more than 452 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:12 state:D stack:0 pid:3210 tgid:3210 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfbedd84 r8:00000002 r7:60000113 r6:dfbedd8c r5:842c0c00
r4:842c0c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:842c0c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbede08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855bdf40
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:842c0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f065000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb151000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8566038c r4:85660000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8566038c r4:84a6c300
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:842c0c00 r8:84a6c32c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a6c300
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a6c300 r8:8027ed34 r7:dfc25e60 r6:84a6c380 r5:842c0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfbedfb0 to 0xdfbedff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a6ba80
INFO: task kworker/1:12:3210 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 92d53000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:13:3213 blocked for more than 452 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:13 state:D stack:0 pid:3213 tgid:3213 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfc29d84 r8:00000002 r7:60000113 r6:dfc29d8c r5:842c3000
r4:842c3000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:842c3000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc29e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4f540
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:842c3000 r7:00000000 r6:83018200 r5:00001000 r4:7f067000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb1ef000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8566078c r4:85660400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8566078c r4:84a6c400
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:842c3000 r8:84a6c42c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a6c400
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a6c400 r8:8027ed34 r7:dfc25e60 r6:84a6c480 r5:842c3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfc29fb0 to 0xdfc29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a6bcc0
INFO: task kworker/1:13:3213 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 9364d000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:14:3216 blocked for more than 452 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:14 state:D stack:0 pid:3216 tgid:3216 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfc35d84 r8:00000002 r7:60000113 r6:dfc35d8c r5:842c1800
r4:842c1800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:842c1800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc35e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85177040
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:842c1800 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb6b5000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85660f8c r4:85660c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85660f8c r4:84a6c500
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:842c1800 r8:84a6c52c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a6c500
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a6c500 r8:8027ed34 r7:dfc25e60 r6:84a6c580 r5:842c1800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfc35fb0 to 0xdfc35ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a67cc0
INFO: task kworker/1:14:3216 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 96446000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:15:3217 blocked for more than 453 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:15 state:D stack:0 pid:3217 tgid:3217 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfc41d84 r8:00000002 r7:60000113 r6:dfc41d8c r5:842c6c00
r4:842c6c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:842c6c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc41e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85177300
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:842c6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb78b000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8566138c r4:85661000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8566138c r4:84a6c600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:842c6c00 r8:84a6c62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a6c600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a6c600 r8:8027ed34 r7:dfc35e60 r6:84a6c680 r5:842c6c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfc41fb0 to 0xdfc41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a6b380
INFO: task kworker/1:15:3217 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 9733a000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:16:3219 blocked for more than 453 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:16 state:D stack:0 pid:3219 tgid:3219 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfc4dd84 r8:00000002 r7:60000113 r6:dfc4dd8c r5:842c0000
r4:842c0000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:842c0000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc4de08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85177480
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:842c0000 r7:00000000 r6:83018200 r5:00001000 r4:7f073000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb835000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8566178c r4:85661400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8566178c r4:84a6c700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:842c0000 r8:84a6c72c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a6c700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a6c700 r8:8027ed34 r7:dfc41e60 r6:84a6c780 r5:842c0000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfc4dfb0 to 0xdfc4dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a63040
INFO: task kworker/1:16:3219 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 97417000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:17:3221 blocked for more than 453 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:17 state:D stack:0 pid:3221 tgid:3221 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfc59d84 r8:00000002 r7:60000113 r6:dfc59d8c r5:842c6000
r4:842c6000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:842c6000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc59e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85177580
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:842c6000 r7:00000000 r6:83018200 r5:00001000 r4:7f075000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb853000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85661b8c r4:85661800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85661b8c r4:84a6c800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:842c6000 r8:84a6c82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a6c800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a6c800 r8:8027ed34 r7:dfc4de60 r6:84a6c880 r5:842c6000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfc59fb0 to 0xdfc59ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a63040
INFO: task kworker/1:17:3221 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 97417000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:18:3223 blocked for more than 453 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:18 state:D stack:0 pid:3223 tgid:3223 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfc65d84 r8:00000002 r7:60000113 r6:dfc65d8c r5:842c2400
r4:842c2400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:842c2400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc65e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85177640
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:842c2400 r7:00000000 r6:83018200 r5:00001000 r4:7f077000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb86d000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85661f8c r4:85661c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85661f8c r4:84a6c900
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:842c2400 r8:84a6c92c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a6c900
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a6c900 r8:8027ed34 r7:dfc59e60 r6:84a6c980 r5:842c2400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfc65fb0 to 0xdfc65ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a63200
INFO: task kworker/1:18:3223 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 979c9000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:154:3512 blocked for more than 453 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:154 state:D stack:0 pid:3512 tgid:3512 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0031d84 r8:00000002 r7:60000113 r6:e0031d8c r5:84a96c00
r4:84a96c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84a96c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0031e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a73e80
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84a96c00 r7:00000000 r6:83018200 r5:00001000 r4:7f065000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfbcf000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8494c78c r4:8494c400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8494c78c r4:84b45b80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a96c00 r8:84b45bac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45b80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45b80 r8:8027ed34 r7:e0361e60 r6:84b45c00 r5:84a96c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0031fb0 to 0xe0031ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671980
INFO: task kworker/1:154:3512 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 97c20000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:54:3522 blocked for more than 453 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:54 state:D stack:0 pid:3522 tgid:3522 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e03a9d84 r8:00000002 r7:60000113 r6:e03a9d8c r5:84751800
r4:84751800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84751800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e03a9e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b280
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84751800 r7:00000000 r6:83018000 r5:00001000 r4:7f033000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfad1000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8f8c r4:84ac8c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8f8c r4:84b3cd80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84751800 r8:84b3cdac r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cd80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cd80 r8:8027ed34 r7:dfe15e60 r6:84b3ce00 r5:84751800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe03a9fb0 to 0xe03a9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473b500
INFO: task kworker/0:54:3522 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 97f48000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:55:3525 blocked for more than 453 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:55 state:D stack:0 pid:3525 tgid:3525 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfe59d84 r8:00000002 r7:60000013 r6:dfe59d8c r5:84984800
r4:84984800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84984800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe59e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b480
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84984800 r7:00000000 r6:83018000 r5:00001000 r4:7f035000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfb09000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac938c r4:84ac9000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac938c r4:84b3ce80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84984800 r8:84b3ceac r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3ce80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3ce80 r8:8027ed34 r7:e03a9e60 r6:84b3cf00 r5:84984800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe59fb0 to 0xdfe59ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a3b100
INFO: task kworker/0:55:3525 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 9830c000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:56:3526 blocked for more than 453 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:56 state:D stack:0 pid:3526 tgid:3526 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfe81d84 r8:00000002 r7:60000113 r6:dfe81d8c r5:84a9a400
r4:84a9a400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84a9a400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe81e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b800
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a9a400 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcad000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac9f8c r4:84ac9c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac9f8c r4:84b3cf80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a9a400 r8:84b3cfac r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cf80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cf80 r8:8027ed34 r7:dfe59e60 r6:84b45e80 r5:84a9a400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe81fb0 to 0xdfe81ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a3b100
INFO: task kworker/0:56:3526 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 98791000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:57:3528 blocked for more than 453 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:57 state:D stack:0 pid:3528 tgid:3528 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfe99d84 r8:00000002 r7:60000113 r6:dfe99d8c r5:84a9b000
r4:84a9b000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84a9b000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe99e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b540
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a9b000 r7:00000000 r6:83018000 r5:00001000 r4:7f037000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfb3b000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac978c r4:84ac9400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac978c r4:846bc000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a9b000 r8:846bc02c r7:82804d40 r6:dddced40 r5:dddced60
r4:846bc000
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:846bc000 r8:8027ed34 r7:dfe81e60 r6:84b45f00 r5:84a9b000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe99fb0 to 0xdfe99ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a3b400
INFO: task kworker/0:57:3528 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 987f6000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:155:3530 blocked for more than 453 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:155 state:D stack:0 pid:3530 tgid:3530 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfeb1d84 r8:00000002 r7:60000013 r6:dfeb1d8c r5:84a9d400
r4:84a9d400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84a9d400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfeb1e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a73d80
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84a9d400 r7:00000000 r6:83018200 r5:00001000 r4:7f063000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfbad000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8494c38c r4:8494c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8494c38c r4:84b45f80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a9d400 r8:84b45fac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45f80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45f80 r8:8027ed34 r7:e0031e60 r6:84b45c80 r5:84a9d400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfeb1fb0 to 0xdfeb1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:846ba200
INFO: task kworker/1:155:3530 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 98b4e000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:58:3532 blocked for more than 453 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:58 state:D stack:0 pid:3532 tgid:3532 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfe71d84 r8:00000002 r7:60000113 r6:dfe71d8c r5:84828000
r4:84828000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84828000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe71e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b6c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84828000 r7:00000000 r6:83018000 r5:00001000 r4:7f039000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc85000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac9b8c r4:84ac9800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac9b8c r4:846bc080
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84828000 r8:846bc0ac r7:82804d40 r6:dddced40 r5:dddced60
r4:846bc080
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:846bc080 r8:8027ed34 r7:dfe81e60 r6:846bc100 r5:84828000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe71fb0 to 0xdfe71ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a3b3c0
INFO: task kworker/0:58:3532 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 98e93000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:59:3534 blocked for more than 453 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:59 state:D stack:0 pid:3534 tgid:3534 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfea5d84 r8:00000002 r7:60000113 r6:dfea5d8c r5:84828c00
r4:84828c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84828c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfea5e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b840
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84828c00 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcdf000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84aca78c r4:84aca400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84aca78c r4:846bc180
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84828c00 r8:846bc1ac r7:82804d40 r6:dddced40 r5:dddced60
r4:846bc180
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:846bc180 r8:8027ed34 r7:dfe81e60 r6:846bc200 r5:84828c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfea5fb0 to 0xdfea5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a3b680
INFO: task kworker/0:59:3534 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 98f59000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:60:3535 blocked for more than 453 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:60 state:D stack:0 pid:3535 tgid:3535 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e039dd84 r8:00000002 r7:60000013 r6:e039dd8c r5:84829800
r4:84829800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84829800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e039de08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b9c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84829800 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcc5000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84aca38c r4:84aca000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84aca38c r4:846bc280
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84829800 r8:846bc2ac r7:82804d40 r6:dddced40 r5:dddced60
r4:846bc280
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:846bc280 r8:8027ed34 r7:dfea5e60 r6:846bc300 r5:84829800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe039dfb0 to 0xe039dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a3b680
INFO: task kworker/0:60:3535 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 9923e000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:61:3538 blocked for more than 453 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:61 state:D stack:0 pid:3538 tgid:3538 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfec9d84 r8:00000002 r7:60000113 r6:dfec9d8c r5:8482a400
r4:8482a400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8482a400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfec9e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3be40
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:8482a400 r7:00000000 r6:83018000 r5:00001000 r4:7f043000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfe2f000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84acaf8c r4:846bc380
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8482a400 r8:846bc3ac r7:82804d40 r6:dddced40 r5:dddced60
r4:846bc380
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:846bc380 r8:8027ed34 r7:dfea5e60 r6:846bc400 r5:8482a400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfec9fb0 to 0xdfec9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a3b940
INFO: task kworker/0:61:3538 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 994f7000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:62:3540 blocked for more than 453 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:62 state:D stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfee1d84 r8:00000002 r7:60000113 r6:dfee1d8c r5:8482b000
r4:8482b000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8482b000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfee1e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3bc80
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:8482b000 r7:00000000 r6:83018000 r5:00001000 r4:7f041000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfe05000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acab8c r4:84aca800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84acab8c r4:846bc480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8482b000 r8:846bc4ac r7:82804d40 r6:dddced40 r5:dddced60
r4:846bc480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:846bc480 r8:8027ed34 r7:dfec9e60 r6:846bc500 r5:8482b000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfee1fb0 to 0xdfee1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a3bbc0
INFO: task kworker/0:62:3540 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 99669000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:63:3541 blocked for more than 453 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:63 state:D stack:0 pid:3541 tgid:3541 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfed5d84 r8:00000002 r7:60000113 r6:dfed5d8c r5:8482c800
r4:8482c800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8482c800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfed5e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3bfc0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f045000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfe43000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84acb38c r4:846bc580
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8482c800 r8:846bc5ac r7:82804d40 r6:dddced40 r5:dddced60
r4:846bc580
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:846bc580 r8:8027ed34 r7:dfec9e60 r6:846bc600 r5:8482c800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfed5fb0 to 0xdfed5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a3bcc0
INFO: task kworker/0:63:3541 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 99eae000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:64:3544 blocked for more than 453 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:64 state:D stack:0 pid:3544 tgid:3544 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfeedd84 r8:00000002 r7:60000113 r6:dfeedd8c r5:8482d400
r4:8482d400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8482d400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfeede08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84671fc0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:8482d400 r7:00000000 r6:83018000 r5:00001000 r4:7f047000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfe61000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb78c r4:84acb400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84acb78c r4:846bc680
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8482d400 r8:846bc6ac r7:82804d40 r6:dddced40 r5:dddced60
r4:846bc680
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:846bc680 r8:8027ed34 r7:dfed5e60 r6:846bc700 r5:8482d400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfeedfb0 to 0xdfeedff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a3be00
INFO: task kworker/0:64:3544 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 99eae000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:65:3546 blocked for more than 453 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:65 state:D stack:0 pid:3546 tgid:3546 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfef9d84 r8:00000002 r7:60000113 r6:dfef9d8c r5:8482e000
r4:8482e000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8482e000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfef9e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b42040
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:8482e000 r7:00000000 r6:83018000 r5:00001000 r4:7f049000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfe95000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acbb8c r4:84acb800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84acbb8c r4:846bc780
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8482e000 r8:846bc7ac r7:82804d40 r6:dddced40 r5:dddced60
r4:846bc780
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:846bc780 r8:8027ed34 r7:dfeede60 r6:846bc800 r5:8482e000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfef9fb0 to 0xdfef9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671d00
INFO: task kworker/0:65:3546 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 9a3a8000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:66:3548 blocked for more than 453 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:66 state:D stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dff05d84 r8:00000002 r7:60000113 r6:dff05d8c r5:8482ec00
r4:8482ec00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8482ec00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff05e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b42580
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:8482ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfef5000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ad438c r4:84ad4000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ad438c r4:846bc880
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8482ec00 r8:846bc8ac r7:82804d40 r6:dddced40 r5:dddced60
r4:846bc880
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:846bc880 r8:8027ed34 r7:dfef9e60 r6:846bc900 r5:8482ec00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff05fb0 to 0xdff05ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b42080
INFO: task kworker/0:66:3548 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 9a9d3000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:67:3550 blocked for more than 453 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:67 state:D stack:0 pid:3550 tgid:3550 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e03add84 r8:00000002 r7:60000113 r6:e03add8c r5:8482bc00
r4:8482bc00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8482bc00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e03ade08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b42300
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:8482bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfec5000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acbf8c r4:84acbc00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84acbf8c r4:846bc980
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8482bc00 r8:846bc9ac r7:82804d40 r6:dddced40 r5:dddced60
r4:846bc980
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:846bc980 r8:8027ed34 r7:dff05e60 r6:846bca00 r5:8482bc00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe03adfb0 to 0xe03adff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b42180
INFO: task kworker/0:67:3550 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 9ba6c000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:68:3551 blocked for more than 453 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:68 state:D stack:0 pid:3551 tgid:3551 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e03b5d84 r8:00000002 r7:60000113 r6:e03b5d8c r5:84780000
r4:84780000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84780000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e03b5e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b42900
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84780000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e03c5000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ad4b8c r4:84ad4800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ad4b8c r4:846bca80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84780000 r8:846bcaac r7:82804d40 r6:dddced40 r5:dddced60
r4:846bca80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:846bca80 r8:8027ed34 r7:dff05e60 r6:846bcb00 r5:84780000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe03b5fb0 to 0xe03b5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b42180
INFO: task kworker/0:68:3551 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 9bbda000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:69:3553 blocked for more than 453 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:69 state:D stack:0 pid:3553 tgid:3553 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e03bdd84 r8:00000002 r7:60000113 r6:e03bdd8c r5:84781800
r4:84781800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84781800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e03bde08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b42800
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84781800 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e03b9000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ad478c r4:84ad4400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ad478c r4:846bcb80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84781800 r8:846bcbac r7:82804d40 r6:dddced40 r5:dddced60
r4:846bcb80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:846bcb80 r8:8027ed34 r7:e03b5e60 r6:846bcc00 r5:84781800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe03bdfb0 to 0xe03bdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b42400
INFO: task kworker/0:69:3553 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 9bc58000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:70:3556 blocked for more than 453 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:70 state:D stack:0 pid:3556 tgid:3556 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e03b1d84 r8:00000002 r7:60000013 r6:e03b1d8c r5:84782400
r4:84782400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84782400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e03b1e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b42b80
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84782400 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e03dd000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ad538c r4:84ad5000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ad538c r4:846bcc80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84782400 r8:846bccac r7:82804d40 r6:dddced40 r5:dddced60
r4:846bcc80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:846bcc80 r8:8027ed34 r7:e03b5e60 r6:846bcd00 r5:84782400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe03b1fb0 to 0xe03b1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b42880
INFO: task kworker/0:70:3556 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 9c55a000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:71:3559 blocked for more than 454 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:71 state:D stack:0 pid:3559 tgid:3559 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e03d5d84 r8:00000002 r7:60000013 r6:e03d5d8c r5:84783000
r4:84783000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84783000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e03d5e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b42a00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84783000 r7:00000000 r6:83018000 r5:00001000 r4:7f053000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e03d1000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ad4f8c r4:84ad4c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ad4f8c r4:846bcd80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84783000 r8:846bcdac r7:82804d40 r6:dddced40 r5:dddced60
r4:846bcd80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:846bcd80 r8:8027ed34 r7:e03b1e60 r6:846bce00 r5:84783000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe03d5fb0 to 0xe03d5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b42780
INFO: task kworker/0:71:3559 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 9c561000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:72:3561 blocked for more than 454 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:72 state:D stack:0 pid:3561 tgid:3561 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e03e1d84 r8:00000002 r7:60000113 r6:e03e1d8c r5:84783c00
r4:84783c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84783c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e03e1e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b42cc0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84783c00 r7:00000000 r6:83018000 r5:00001000 r4:7f057000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e03e9000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ad578c r4:84ad5400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ad578c r4:846bce80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84783c00 r8:846bceac r7:82804d40 r6:dddced40 r5:dddced60
r4:846bce80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:846bce80 r8:8027ed34 r7:e03b1e60 r6:846bcf00 r5:84783c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe03e1fb0 to 0xe03e1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b42940
INFO: task kworker/0:72:3561 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 9c7c6000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:73:3563 blocked for more than 454 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:73 state:D stack:0 pid:3563 tgid:3563 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e03f9d84 r8:00000002 r7:60000113 r6:e03f9d8c r5:84784800
r4:84784800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84784800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e03f9e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b42ec0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84784800 r7:00000000 r6:83018000 r5:00001000 r4:7f059000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e03f5000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ad5b8c r4:84ad5800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ad5b8c r4:846bcf80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84784800 r8:846bcfac r7:82804d40 r6:dddced40 r5:dddced60
r4:846bcf80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:846bcf80 r8:8027ed34 r7:e03e1e60 r6:84a76000 r5:84784800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe03f9fb0 to 0xe03f9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b42b40
INFO: task kworker/0:73:3563 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 9c9d7000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:74:3564 blocked for more than 454 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:74 state:D stack:0 pid:3564 tgid:3564 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e03c9d84 r8:00000002 r7:60000113 r6:e03c9d8c r5:84785400
r4:84785400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84785400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e03c9e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b424c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84785400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0401000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ad5f8c r4:84ad5c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ad5f8c r4:84a76080
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84785400 r8:84a760ac r7:82804d40 r6:dddced40 r5:dddced60
r4:84a76080
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a76080 r8:8027ed34 r7:e03f9e60 r6:84a76100 r5:84785400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe03c9fb0 to 0xe03c9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b42d40
INFO: task kworker/0:74:3564 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 9cd01000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:75:3566 blocked for more than 454 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:75 state:D stack:0 pid:3566 tgid:3566 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0405d84 r8:00000002 r7:60000013 r6:e0405d8c r5:84786000
r4:84786000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84786000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0405e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a5a280
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84786000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0419000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ad678c r4:84ad6400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ad678c r4:84a76180
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84786000 r8:84a761ac r7:82804d40 r6:dddced40 r5:dddced60
r4:84a76180
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a76180 r8:8027ed34 r7:e03c9e60 r6:84a76200 r5:84786000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0405fb0 to 0xe0405ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b42f80
INFO: task kworker/0:75:3566 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 9d248000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:76:3568 blocked for more than 454 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:76 state:D stack:0 pid:3568 tgid:3568 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0411d84 r8:00000002 r7:60000013 r6:e0411d8c r5:84786c00
r4:84786c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84786c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0411e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a5a040
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e041dd84 r8:00000002 r7:60000113 r6:e041dd8c r5:84780c00
r4:84780c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84780c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e041de08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a5a4c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84780c00 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0425000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ad6b8c r4:84ad6800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ad6b8c r4:84a76380
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84780c00 r8:84a763ac r7:82804d40 r6:dddced40 r5:dddced60
r4:84a76380
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a76380 r8:8027ed34 r7:e0405e60 r6:84a76400 r5:84780c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe041dfb0 to 0xe041dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a5a100
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e044dd84 r8:00000002 r7:60000113 r6:e044dd8c r5:84a9e000
r4:84a9e000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84a9e000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e044de08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a5a600
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0431000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ad6f8c r4:84ad6c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ad6f8c r4:84a76580
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a9e000 r8:84a765ac r7:82804d40 r6:dddced40 r5:dddced60
r4:84a76580
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a76580 r8:8027ed34 r7:e0429e60 r6:84a55000 r5:84a9e000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe044dfb0 to 0xe044dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:00000000
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:80:3575 blocked for more than 454 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:80 state:D stack:0 pid:3575 tgid:3575 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0455d84 r8:00000002 r7:60000113 r6:e0455d8c r5:84a9ec00
r4:84a9ec00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84a9ec00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0455e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a5ab80
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a9ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0469000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ad7f8c r4:84ad7c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ad7f8c r4:84a76600
r10:61c88647 r9:84a9ec00 r8:84a7662c r7:82804d40 r6:dddced40 r5:dddced60
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a5a5c0
INFO: task kworker/0:80:3575 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 9dbef000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:81:3577 blocked for more than 454 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:81 state:D stack:0 pid:3577 tgid:3577 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0461d84 r8:00000002 r7:60000013 r6:e0461d8c r5:84a9bc00
r4:84a9bc00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84a9bc00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0461e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a5a880
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a9bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0449000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ad778c r4:84ad7400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ad778c r4:84a76680
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a9bc00 r8:84a766ac r7:82804d40 r6:dddced40 r5:dddced60
r4:84a76680
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a76680 r8:8027ed34 r7:e0455e60 r6:84a55100 r5:84a9bc00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0461fb0 to 0xe0461ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a5a840
INFO: task kworker/0:81:3577 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 9e130000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:82:3580 blocked for more than 454 seconds.
task:kworker/0:82 state:D stack:0 pid:3580 tgid:3580 ppid:2 task_flags:0x4208060 flags:0x00000000
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e046de08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a5aa40
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a9c800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e045d000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ad7b8c r4:84ad7800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ad7b8c r4:84a76700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a9c800 r8:84a7672c r7:82804d40 r6:dddced40 r5:dddced60
r4:84a76700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a76700 r8:8027ed34 r7:e0455e60 r6:84a55180 r5:84a9c800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe046dfb0 to 0xe046dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a5a8c0
INFO: task kworker/0:82:3580 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 9e550000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
Workqueue: events bpf_prog_free_deferred
r4:84b20000
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0495e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r5:00001000 r4:e04b3000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84adcb8c r4:84adc800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84adcb8c r4:84a76780
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84b20000 r8:84a767ac r7:82804d40 r6:dddced40 r5:dddced60
r4:84a76780
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a76780 r8:8027ed34 r7:e0455e60 r6:84a55200 r5:84b20000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0495fb0 to 0xe0495ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a5aa00
INFO: task kworker/0:83:3582 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 9e8a5000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:84:3583 blocked for more than 454 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:84 state:D stack:0 pid:3583 tgid:3583 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e049dd84 r8:00000002 r7:60000113 r6:e049dd8c r5:84b20c00
r4:84b20c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84b20c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e049de08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a5ad00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84b20c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0475000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84adc38c r4:84adc000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84adc38c r4:84a76800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84b20c00 r8:84a7682c r7:82804d40 r6:dddced40 r5:dddced60
r4:84a76800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a76800 r8:8027ed34 r7:e0495e60 r6:84a55280 r5:84b20c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe049dfb0 to 0xe049dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a5aa00
INFO: task kworker/0:84:3583 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 9eabc000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:85:3585 blocked for more than 454 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:85 state:D stack:0 pid:3585 tgid:3585 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e04add84 r8:00000002 r7:60000113 r6:e04add8c r5:84b22400
r4:84b22400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84b22400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04ade08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a5ae00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84b22400 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e04a3000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84adc78c r4:84adc400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84adc78c r4:84a76880
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84b22400 r8:84a768ac r7:82804d40 r6:dddced40 r5:dddced60
r4:84a76880
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a76880 r8:8027ed34 r7:e0495e60 r6:84a55300 r5:84b22400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe04adfb0 to 0xe04adff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a5ab00
INFO: task kworker/0:85:3585 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 9f091000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:86:3588 blocked for more than 454 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:86 state:D stack:0 pid:3588 tgid:3588 ppid:2 task_flags:0x4208060 flags:0x00000000
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04c1e08
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r10:00000000 r9:84a76900 r8:8027ed34 r7:e0495e60 r6:84a55380 r5:84b21800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe04c1fb0 to 0xe04c1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a5ac00
INFO: task kworker/0:86:3588 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 9f091000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r5:00001000 r4:ec917000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Not tainted 6.16.0-rc2-syzkaller #0
r10:829185c4 r9:e04cdd84 r8:00000002 r7:60000113 r6:e04cdd8c r5:84b23000
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04cde08
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e04cf000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84adcf8c r4:84adcc00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84adcf8c r4:84a76980
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84b23000 r8:84a769ac r7:82804d40 r6:dddced40 r5:dddced60
r4:84a76980
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a76980 r8:8027ed34 r7:e04c1e60 r6:84a55400 r5:84b23000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe04cdfb0 to 0xe04cdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a5adc0
INFO: task kworker/0:87:3589 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 9f3f0000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
task:kworker/0:88 state:D stack:0 pid:3594 tgid:3594 ppid:2 task_flags:0x4208060 flags:0x00000000
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff5de08
r4:00000000
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:846bad40
INFO: task kworker/0:88:3594 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 9f70c000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:89:3595 blocked for more than 454 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:89 state:D stack:0 pid:3595 tgid:3595 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dff65d84 r8:00000002 r7:60000113 r6:dff65d8c r5:84b26000
r4:84b26000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff65e08
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 9fd51000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r10:829185c4 r9:e000dd84 r8:00000002 r7:60000113 r6:e000dd8c r5:84b26c00
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e000de08
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r5:846cf38c r4:846cf000
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a76b00 r8:8027ed34 r7:dff65e60 r6:84a55580 r5:84b26c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe000dfb0 to 0xe000dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84683080
INFO: task kworker/0:90:3596 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: a0a75000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Workqueue: events bpf_prog_free_deferred
r5:84b25400 r4:829185c0
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0435e08
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r10:00000000 r9:84a55600 r8:8027ed34 r7:e0031e60 r6:84a55680 r5:84b25400
r4:84a73c80
Workqueue: events bpf_prog_free_deferred
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: a10a8000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Workqueue: events bpf_prog_free_deferred
r10:829185c4 r9:dff19d84 r8:00000002 r7:60000113 r6:dff19d8c r5:84b23c00
r4:84b23c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84b23c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff19e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a733c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84b23c00 r7:00000000 r6:83018200 r5:00001000 r4:7f067000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfbe3000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8494cb8c r4:8494c800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8494cb8c r4:84a55700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r4:00000001
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r5:80010013 r4:80239bd0
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r5:8577c38c r4:8577c000
r4:84b45700
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
INFO: task kworker/1:158:3604 blocked for more than 455 seconds.
r4:84a94800
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0441e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a73100
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84a94800 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc2b000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8494d38c r4:8494d000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8494d38c r4:84a55800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a94800 r8:84a5582c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a55800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a55800 r8:8027ed34 r7:e0435e60 r6:84a55880 r5:84a94800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0441fb0 to 0xe0441ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a73400
INFO: task kworker/1:158:3604 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: a15f0000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r4:00000000
r5:00001000 r4:ec917000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Not tainted 6.16.0-rc2-syzkaller #0
task:kworker/1:159 state:D stack:0 pid:3605 tgid:3605 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0041d84 r8:00000002 r7:60000013 r6:e0041d8c r5:84b58000
r4:84b58000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84b58000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0041e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a54280
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84b58000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd47000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8494db8c r4:8494d800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8494db8c r4:84a55900
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84b58000 r8:84a5592c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a55900
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a55900 r8:8027ed34 r7:e0441e60 r6:84a55980 r5:84b58000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0041fb0 to 0xe0041ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a73480
INFO: task kworker/1:159:3605 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: a1b24000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
r4:e0361dc0
r4:00000000
r5:00001000 r4:ec917000
r5:8577c38c r4:8577c000
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:160:3607 blocked for more than 455 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:160 state:D stack:0 pid:3607 tgid:3607 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0051d84 r8:00000002 r7:60000113 r6:e0051d8c r5:848a3000
r4:848a3000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:848a3000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0051e08
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a54040
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc5d000
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8494d78c r4:8494d400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8494d78c r4:84a55a00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848a3000 r8:84a55a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a55a00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a55a00 r8:8027ed34 r7:e0041e60 r6:84a76b80 r5:848a3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0051fb0 to 0xe0051ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a73140
INFO: task kworker/1:160:3607 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: a21ed000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:91:3609 blocked for more than 455 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:91 state:D stack:0 pid:3609 tgid:3609 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0391d84 r8:00000002 r7:60000113 r6:e0391d8c r5:848a4800
r4:848a4800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:848a4800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0391e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85165d00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:848a4800 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eab23000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:83edc38c r4:83edc000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:83edc38c r4:84a76c00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848a4800 r8:84a76c2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84a76c00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a76c00 r8:8027ed34 r7:dff65e60 r6:84a76c80 r5:848a4800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0391fb0 to 0xe0391ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:846834c0
INFO: task kworker/0:91:3609 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: a256a000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
r10:829185c4 r9:e04f5d84 r8:00000002 r7:60000113 r6:e04f5d8c r5:848a6000
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04f5e08
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r4:00000001
Exception stack(0xe04f5fb0 to 0xe04f5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a54100
INFO: task kworker/1:161:3612 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: a3244000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r4:00000000
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:162:3614 blocked for more than 455 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:162 state:D stack:0 pid:3614 tgid:3614 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0505d84 r8:00000002 r7:60000113 r6:e0505d8c r5:848a6c00
r4:848a6c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:848a6c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0505e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a543c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848a6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f073000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd65000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8494df8c r4:8494dc00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8494df8c r4:84a55b00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:163:3615 blocked for more than 455 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:163 state:D stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e050dd84 r8:00000002 r7:60000113 r6:e050dd8c r5:848a3c00
r4:848a3c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:848a3c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e050de08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a547c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848a3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfdad000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8494eb8c r4:8494e800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8494eb8c r4:84a55b80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848a3c00 r8:84a55bac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a55b80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a55b80 r8:8027ed34 r7:e04f5e60 r6:84a76e00 r5:848a3c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe050dfb0 to 0xe050dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a54300
INFO: task kworker/1:163:3615 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: a4a72000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:164:3617 blocked for more than 455 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:164 state:D stack:0 pid:3617 tgid:3617 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0521d84 r8:00000002 r7:60000013 r6:e0521d8c r5:848a2400
r4:848a2400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:848a2400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0521e08
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a546c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f077000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd97000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8494e78c r4:8494e400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8494e78c r4:84a55c00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848a2400 r8:84a55c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a55c00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a55c00 r8:8027ed34 r7:e050de60 r6:84a76e80 r5:848a2400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0521fb0 to 0xe0521ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a54100
INFO: task kworker/1:164:3617 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:165:3619 blocked for more than 455 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:165 state:D stack:0 pid:3619 tgid:3619 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
r10:829185c4 r9:e052dd84 r8:00000002 r7:60000113 r6:e052dd8c r5:848a0c00
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e052de08
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a54a40
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848a0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfde1000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8494f38c r4:8494f000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8494f38c r4:84a55c80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848a0c00 r8:84a55cac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a55c80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a55c80 r8:8027ed34 r7:e050de60 r6:84a76f00 r5:848a0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe052dfb0 to 0xe052dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a544c0
INFO: task kworker/1:165:3619 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Not tainted 6.16.0-rc2-syzkaller #0
r10:829185c4 r9:e053dd84 r8:00000002 r7:60000113 r6:e053dd8c r5:847d8000
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e053de08
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
r5:00001000 r4:dfdc7000
r5:8494ef8c r4:8494ec00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8494ef8c r4:84a55d00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:847d8000 r8:84a55d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a55d00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a55d00 r8:8027ed34 r7:e052de60 r6:84a76f80 r5:847d8000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe053dfb0 to 0xe053dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a545c0
INFO: task kworker/1:166:3621 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: a4d0d000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Workqueue: events bpf_prog_free_deferred
r5:847d9800 r4:829185c0
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0555e08
r4:00000000
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r10:61c88647 r9:847d9800 r8:84a55dac r7:82804d40 r6:ddde2d40 r5:ddde2d60
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
r4:84a54640
INFO: task kworker/1:167:3623 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: a4d0d000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:92:3624 blocked for more than 455 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:92 state:D stack:0 pid:3624 tgid:3624 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0559d84 r8:00000002 r7:60000113 r6:e0559d8c r5:847da400
r4:847da400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:847da400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0559e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b40540
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:847da400 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa2d000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84addf8c r4:84addc00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84addf8c r4:84b30080
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:847da400 r8:84b300ac r7:82804d40 r6:dddced40 r5:dddced60
r4:84b30080
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b30080 r8:8027ed34 r7:e0391e60 r6:84b30100 r5:847da400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0559fb0 to 0xe0559ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84683b80
INFO: task kworker/0:92:3624 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: a5252000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
INFO: task kworker/1:168:3626 blocked for more than 455 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:168 state:D stack:0 pid:3626 tgid:3626 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0561d84 r8:00000002 r7:60000113 r6:e0561d8c r5:847d8c00
r4:847d8c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:847d8c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0561e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a54bc0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:847d8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfdf5000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8494f78c r4:8494f400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8494f78c r4:84a55e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:847d8c00 r8:84a55e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a55e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a55e00 r8:8027ed34 r7:e0555e60 r6:84b30180 r5:847d8c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0561fb0 to 0xe0561ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a548c0
INFO: task kworker/1:168:3626 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: a5648000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
r4:e0361dc0
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0569e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a54c00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:847db000 r7:00000000 r6:83018200 r5:00001000 r4:7f081000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dff23000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8494fb8c r4:8494f800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8494fb8c r4:84a55e80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:847db000 r8:84a55eac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a55e80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a55e80 r8:8027ed34 r7:e0555e60 r6:84b30200 r5:847db000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0569fb0 to 0xe0569ff8)
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
r4:82abf1e4
r4:00000000
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/1:170 state:D stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0571e08
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84683e80
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:847dbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f087000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dff53000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84a4478c r4:84a44400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84a4478c r4:84a55f00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:847dbc00 r8:84a55f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a55f00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a55f00 r8:8027ed34 r7:e0555e60 r6:84b30280 r5:847dbc00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0571fb0 to 0xe0571ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a54ac0
INFO: task kworker/1:170:3630 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: a5f3a000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
r5:80010013 r4:80239bd0
r4:00000000
r5:00001000 r4:ec917000
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/1:171 state:D stack:0 pid:3632 tgid:3632 ppid:2 task_flags:0x4208060 flags:0x00000000
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0579e08
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r4:84a55f80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a55f80 r8:8027ed34 r7:e0571e60 r6:84b30300 r5:847dc800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0579fb0 to 0xe0579ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a54f40
INFO: task kworker/1:171:3632 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: a6373000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:172:3634 blocked for more than 455 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:172 state:D stack:0 pid:3634 tgid:3634 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0581d84 r8:00000002 r7:60000113 r6:e0581d8c r5:847dd400
r4:847dd400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:847dd400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0581e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b39380
r4:00000000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84a4538c r4:84a45000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84a4538c r4:84b3b000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:847dd400 r8:84b3b02c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b3b000
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3b000 r8:8027ed34 r7:e0571e60 r6:84b30380 r5:847dd400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0581fb0 to 0xe0581ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a54d00
INFO: task kworker/1:172:3634 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: a6863000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:173:3636 blocked for more than 455 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:173 state:D stack:0 pid:3636 tgid:3636 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
r10:829185c4 r9:e0589d84 r8:00000002 r7:60000013 r6:e0589d8c r5:847de000
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0589e08
r4:00000000
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84a44b8c r4:84a44800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84a44b8c r4:84b3b080
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:847de000 r8:84b3b0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b3b080
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3b080 r8:8027ed34 r7:e0581e60 r6:84b30400 r5:847de000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0589fb0 to 0xe0589ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84683340
INFO: task kworker/1:173:3636 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0591e08
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r5:00001000 r4:dff8b000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84a44f8c r4:84a44c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84a44f8c r4:84b3b100
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848a5400 r8:84b3b12c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b3b100
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3b100 r8:8027ed34 r7:e0581e60 r6:84b30480 r5:848a5400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0591fb0 to 0xe0591ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b39080
INFO: task kworker/1:174:3638 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Workqueue: events bpf_prog_free_deferred
r5:848a1800 r4:829185c0
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e059de08
r4:00000000
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r10:61c88647 r9:848a1800 r8:84b3b1ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
dfa0: 00000000 00000000 00000000 00000000
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
r4:82abf1e4
r4:00000000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:176:3642 blocked for more than 455 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:176 state:D stack:0 pid:3642 tgid:3642 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e003dd84 r8:00000002 r7:60000113 r6:e003dd8c r5:84b59800
r4:84b59800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84b59800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e003de08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b39480
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84b59800 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dffa7000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84a4578c r4:84a45400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84a4578c r4:84b3b200
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84b59800 r8:84b3b22c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b3b200
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3b200 r8:8027ed34 r7:e059de60 r6:84b3b280 r5:84b59800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe003dfb0 to 0xe003dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Workqueue: events bpf_prog_free_deferred
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
r4:00000000
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:177:3645 blocked for more than 455 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:177 state:D stack:0 pid:3645 tgid:3645 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e058dd84 r8:00000002 r7:60000013 r6:e058dd8c r5:84b5b000
r4:84b5b000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84b5b000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e058de08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b39600
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84b5b000 r7:00000000 r6:83018200 r5:00001000 r4:7f091000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dffbb000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84a45b8c r4:84a45800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84a45b8c r4:84b3b300
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84b5b000 r8:84b3b32c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b3b300
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r4:00000001
r4:84b39280
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
r4:84b45700
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:178:3647 blocked for more than 456 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:178 state:D stack:0 pid:3647 tgid:3647 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e05a1d84 r8:00000002 r7:60000013 r6:e05a1d8c r5:84b5bc00
r4:84b5bc00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84b5bc00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05a1e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
r4:00000000
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r4:00000001
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
r5:80010013 r4:80239bd0
r4:00000000
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:179:3648 blocked for more than 456 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:179 state:D stack:0 pid:3648 tgid:3648 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e04e9d84 r8:00000002 r7:60000013 r6:e04e9d8c r5:84b5c800
r4:84b5c800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84b5c800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04e9e08
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
r5:00001000 r4:dffdb000
r7:ddde2d40 r6:83018200 r5:84a4638c r4:84b3b500
r10:61c88647 r9:84b5c800 r8:84b3b52c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b3b500
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3b500 r8:8027ed34 r7:e05a1e60 r6:84b3b580 r5:84b5c800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe04e9fb0 to 0xe04e9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b395c0
INFO: task kworker/1:179:3648 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: a7e30000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Not tainted 6.16.0-rc2-syzkaller #0
r10:829185c4 r9:e05bdd84 r8:00000002 r7:60000013 r6:e05bdd8c r5:84968c00
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05bde08
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r4:84b3b700
Exception stack(0xe05bdfb0 to 0xe05bdff8)
r4:84b39700
Workqueue: events bpf_prog_free_deferred
r4:00000000
1d60: 80010013 ffffffff
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:182:3655 blocked for more than 456 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:182 state:D stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e05c5d84 r8:00000002 r7:60000113 r6:e05c5d8c r5:8496a400
r4:8496a400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8496a400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05c5e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a54e80
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8496a400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b9000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r10:00000000 r9:84b3b780 r8:8027ed34 r7:e05bde60 r6:84b30600 r5:8496a400
r4:84b39b40
Workqueue: events bpf_prog_free_deferred
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:183:3656 blocked for more than 456 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:183 state:D stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e05c9d84 r8:00000002 r7:60000113 r6:e05c9d8c r5:84968000
r4:84968000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84968000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05c9e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b39e80
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84968000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0023000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84a4738c r4:84a47000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84a4738c r4:84b3b800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84968000 r8:84b3b82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b3b800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3b800 r8:8027ed34 r7:e05c5e60 r6:84b30680 r5:84968000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe05c9fb0 to 0xe05c9ff8)
9fa0: 00000000 00000000 00000000 00000000
r4:84b39b40
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
r5:80010013 r4:80239bd0
r4:e0361dc0
r4:00000000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Not tainted 6.16.0-rc2-syzkaller #0
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
r4:00000000
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
1fa0: 00000000 00000000 00000000 00000000
r4:84b39d00
Workqueue: events bpf_prog_free_deferred
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:185:3661 blocked for more than 456 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:185 state:D stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e05d5d84 r8:00000002 r7:60000113 r6:e05d5d8c r5:8496bc00
r4:8496bc00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8496bc00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05d5e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84904300
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8496bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f00d000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:df885000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r5:84b8838c r4:84b88000
r4:84b3b900
5fa0: 00000000 00000000 00000000 00000000
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
1d60: 80010013 ffffffff
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:186:3662 blocked for more than 456 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:186 state:D stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e05d9d84 r8:00000002 r7:60000013 r6:e05d9d8c r5:8496c800
r4:8496c800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05d9e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849040c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8496c800 r7:00000000 r6:83018200 r5:00001000 r4:7f0bb000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0367000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84a47f8c r4:84a47c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84a47f8c r4:84b3b980
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8496c800 r8:84b3b9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b3b980
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3b980 r8:8027ed34 r7:e05d5e60 r6:84b30800 r5:8496c800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
r4:e0361dc0
r4:00000000
r5:00001000 r4:ec917000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
1fa0: 00000000 00000000 00000000 00000000
Not tainted 6.16.0-rc2-syzkaller #0
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc95e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84904840
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8496d400 r7:00000000 r6:83018200 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfaf1000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84b8938c r4:84b89000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84b8938c r4:84b3ba00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8496d400 r8:84b3ba2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b3ba00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3ba00 r8:8027ed34 r7:e05d5e60 r6:84b30880 r5:8496d400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfc95fb0 to 0xdfc95ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84904000
INFO: task kworker/1:187:3665 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: a9aad000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r5:8577c38c r4:8577c000
r4:84b45700
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/1:188 state:D stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe39e08
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r5:84b8878c r4:84b88400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84b8878c r4:84b3ba80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8496e000 r8:84b3baac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b3ba80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3ba80 r8:8027ed34 r7:dfc95e60 r6:84b30900 r5:8496e000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe39fb0 to 0xdfe39ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84904200
INFO: task kworker/1:188:3666 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: a9d76000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:189:3668 blocked for more than 456 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:189 state:D stack:0 pid:3668 tgid:3668 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfebdd84 r8:00000002 r7:60000113 r6:dfebdd8c r5:8496b000
r4:8496b000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8496b000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfebde08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84904780
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8496b000 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa8d000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84b88f8c r4:84b88c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84b88f8c r4:84b3bb00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8496b000 r8:84b3bb2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b3bb00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3bb00 r8:8027ed34 r7:dfc95e60 r6:84b30980 r5:8496b000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfebdfb0 to 0xdfebdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84904540
INFO: task kworker/1:189:3668 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: aa1ea000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:190:3673 blocked for more than 456 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:190 state:D stack:0 pid:3673 tgid:3673 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0395d84 r8:00000002 r7:60000113 r6:e0395d8c r5:84768000
r4:84768000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84768000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0395e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84904980
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84768000 r7:00000000 r6:83018200 r5:00001000 r4:7f033000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfb2d000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84b8978c r4:84b89400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84b8978c r4:84b3bb80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84768000 r8:84b3bbac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b3bb80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3bb80 r8:8027ed34 r7:dfc95e60 r6:84b30a00 r5:84768000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0395fb0 to 0xe0395ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:849046c0
INFO: task kworker/1:190:3673 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: aa986000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:191:3675 blocked for more than 456 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:191 state:D stack:0 pid:3675 tgid:3675 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e03edd84 r8:00000002 r7:60000113 r6:e03edd8c r5:84769800
r4:84769800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84769800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e03ede08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84904f00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84769800 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfe07000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84b8a78c r4:84b8a400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84b8a78c r4:84b3bc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84769800 r8:84b3bc2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b3bc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3bc00 r8:8027ed34 r7:e0395e60 r6:84b30b00 r5:84769800
r4:00000001
Exception stack(0xe03edfb0 to 0xe03edff8)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
1fa0: 00000000 00000000 00000000 00000000
r4:84671280
INFO: task kworker/0:93:3676 blocked for more than 456 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:93 state:D stack:0 pid:3676 tgid:3676 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0459d84 r8:00000002 r7:60000113 r6:e0459d8c r5:8476a400
r4:8476a400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8476a400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0459e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849070c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:8476a400 r7:00000000 r6:83018000 r5:00001000 r4:7f0e9000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ea88d000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r4:84b30a80
9fa0: 00000000 00000000 00000000 00000000
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
r4:e0361dc0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:192:3677 blocked for more than 456 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:192 state:D stack:0 pid:3677 tgid:3677 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e04a9d84 r8:00000002 r7:60000013 r6:e04a9d8c r5:8476b000
r4:8476b000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8476b000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04a9e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84904b40
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8476b000 r7:00000000 r6:83018200 r5:00001000 r4:7f035000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc91000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84b89b8c r4:84b89800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84b89b8c r4:84b3bc80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8476b000 r8:84b3bcac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b3bc80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3bc80 r8:8027ed34 r7:e03ede60 r6:84b30c00 r5:8476b000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe04a9fb0 to 0xe04a9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84904800
INFO: task kworker/1:192:3677 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: aae8b000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:193:3679 blocked for more than 456 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:193 state:D stack:0 pid:3679 tgid:3679 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e05add84 r8:00000002 r7:60000113 r6:e05add8c r5:84b5e000
r4:84b5e000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84b5e000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05ade08
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe05adfb0 to 0xe05adff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84904900
INFO: task kworker/1:193:3679 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: aaf41000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:194:3683 blocked for more than 456 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:194 state:D stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e05e1d84 r8:00000002 r7:60000013 r6:e05e1d8c r5:84768c00
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05e1e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84904dc0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84768c00 r7:00000000 r6:83018200 r5:00001000 r4:7f039000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcdd000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84b8a38c r4:84b8a000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r4:84b3be00
r4:00000001
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Workqueue: events bpf_prog_free_deferred
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:195:3684 blocked for more than 456 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:195 state:D stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e05e5d84 r8:00000002 r7:60000013 r6:e05e5d8c r5:8476bc00
r4:8476bc00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8476bc00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05e5e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84665800
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8476bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
r5:00001000 r4:e03bf000
r7:ddde2d40 r6:83018200 r5:84b8c78c r4:84b3be80
Exception stack(0xe05e5fb0 to 0xe05e5ff8)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Workqueue: events bpf_prog_free_deferred
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
1d20: ab77f000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
r4:e0361dc0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:196:3685 blocked for more than 456 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:196 state:D stack:0 pid:3685 tgid:3685 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e05e9d84 r8:00000002 r7:60000113 r6:e05e9d8c r5:8476d400
r4:8476d400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8476d400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05e9e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84904280
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8476d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfe2d000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84b8ab8c r4:84b8a800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84b8ab8c r4:84b3bf00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8476d400 r8:84b3bf2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b3bf00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3bf00 r8:8027ed34 r7:e05e5e60 r6:84b30d80 r5:8476d400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe05e9fb0 to 0xe05e9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84904fc0
INFO: task kworker/1:196:3685 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: abd3f000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:197:3687 blocked for more than 456 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:197 state:D stack:0 pid:3687 tgid:3687 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e04b9d84 r8:00000002 r7:60000013 r6:e04b9d8c r5:84b58c00
r4:84b58c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84b58c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04b9e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b401c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84b58c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfe45000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84b8af8c r4:84b8ac00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84b8af8c r4:84b3bf80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84b58c00 r8:84b3bfac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b3bf80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3bf80 r8:8027ed34 r7:e05e5e60 r6:84a52000 r5:84b58c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe04b9fb0 to 0xe04b9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b40000
INFO: task kworker/1:197:3687 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: abedd000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:198:3690 blocked for more than 456 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:198 state:D stack:0 pid:3690 tgid:3690 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e05f1d84 r8:00000002 r7:60000113 r6:e05f1d8c r5:84b5a400
r4:84b5a400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84b5a400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05f1e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84904040
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84b5a400 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfe65000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84b8b38c r4:84b8b000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84b8b38c r4:84a52080
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84b5a400 r8:84a520ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a52080
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a52080 r8:8027ed34 r7:e05e5e60 r6:84a52100 r5:84b5a400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe05f1fb0 to 0xe05f1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84904400
INFO: task kworker/1:198:3690 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: ac1ca000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:199:3692 blocked for more than 456 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:199 state:D stack:0 pid:3692 tgid:3692 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfe8dd84 r8:00000002 r7:60000113 r6:dfe8dd8c r5:84b60000
r4:84b60000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84b60000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe8de08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84665100
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84b60000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfea1000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84b8b78c r4:84b8b400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84b8b78c r4:84a52180
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84b60000 r8:84a521ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a52180
r10:00000000 r9:84a52180 r8:8027ed34 r7:e05e5e60 r6:84a52200 r5:84b60000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: ac564000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:200:3693 blocked for more than 456 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:200 state:D stack:0 pid:3693 tgid:3693 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e05f9d84 r8:00000002 r7:60000113 r6:e05f9d8c r5:84b60c00
r4:84b60c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84b60c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05f9e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84665480
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84b60c00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfedd000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84b8bb8c r4:84b8b800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84b8bb8c r4:84a52280
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84b60c00 r8:84a522ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a52280
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a52280 r8:8027ed34 r7:e05e5e60 r6:84a52300 r5:84b60c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe05f9fb0 to 0xe05f9ff8)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
1d20: ac888000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:201:3696 blocked for more than 457 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:201 state:D stack:0 pid:3696 tgid:3696 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e05f5d84 r8:00000002 r7:60000013 r6:e05f5d8c r5:84b61800
r4:84b61800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84b61800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05f5e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84665580
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84b61800 r7:00000000 r6:83018200 r5:00001000 r4:7f047000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e037f000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84b8bf8c r4:84b8bc00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84b8bf8c r4:84a52380
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84b61800 r8:84a523ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a52380
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a52380 r8:8027ed34 r7:e05e5e60 r6:84a52400 r5:84b61800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe05f5fb0 to 0xe05f5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:846655c0
INFO: task kworker/1:201:3696 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d60: 80010013 ffffffff
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:84671280
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0601e08
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:00000000 r9:84a52480 r8:8027ed34 r7:e05e5e60 r6:84a52500 r5:84b62400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0601fb0 to 0xe0601ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84665400
INFO: task kworker/1:202:3698 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: ad35d000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
Exception stack(0xe0361fb0 to 0xe0361ff8)
r4:84671280
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0605e08
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r5:00001000 r4:e03ef000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84b8d38c r4:84b8d000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84b8d38c r4:84a52580
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84b63000 r8:84a525ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a52580
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a52580 r8:8027ed34 r7:e05e5e60 r6:84a52600 r5:84b63000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0605fb0 to 0xe0605ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:846658c0
INFO: task kworker/1:203:3700 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: ae469000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:204:3702 blocked for more than 457 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:204 state:D stack:0 pid:3702 tgid:3702 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0609d84 r8:00000002 r7:60000113 r6:e0609d8c r5:84b63c00
r4:84b63c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84b63c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0609e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84665a00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84b63c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e03cd000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84b8cb8c r4:84b8c800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84b8cb8c r4:84a52680
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84b63c00 r8:84a526ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a52680
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a52680 r8:8027ed34 r7:e0605e60 r6:84a52700 r5:84b63c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84665b40
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84b64800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e03db000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84b8cf8c r4:84b8cc00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84b8cf8c r4:84a52780
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84b64800 r8:84a527ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a52780
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a52780 r8:8027ed34 r7:e0605e60 r6:84a52800 r5:84b64800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe05fdfb0 to 0xe05fdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84665a80
INFO: task kworker/1:205:3703 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: af971000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:206:3706 blocked for more than 457 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:206 state:D stack:0 pid:3706 tgid:3706 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e060dd84 r8:00000002 r7:60000013 r6:e060dd8c r5:84b65400
r4:84b65400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84b65400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e060de08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84665e00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84b65400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e03fd000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84b8d78c r4:84b8d400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84b8d78c r4:84a52880
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84b65400 r8:84a528ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a52880
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a52880 r8:8027ed34 r7:e0605e60 r6:84a52900 r5:84b65400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe060dfb0 to 0xe060dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84665ac0
INFO: task kworker/1:206:3706 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r4:00000000
r4:82abf1e4
r4:00000000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0615e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84b66000 r7:00000000 r6:83018200 r5:00001000 r4:7f057000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e041f000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84b8df8c r4:84b8dc00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84b8df8c r4:84a52980
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84b66000 r8:84a529ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a52980
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a52980 r8:8027ed34 r7:e060de60 r6:84a52a00 r5:84b66000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0615fb0 to 0xe0615ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84665c80
INFO: task kworker/1:207:3708 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: b2d3e000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:208:3710 blocked for more than 457 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:208 state:D stack:0 pid:3710 tgid:3710 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0611d84 r8:00000002 r7:60000113 r6:e0611d8c r5:84b66c00
r4:84b66c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84b66c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0611e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84665f80
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84b66c00 r7:00000000 r6:83018200 r5:00001000 r4:7f055000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e040b000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84b8db8c r4:84b8d800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84b8db8c r4:84a52a80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84b66c00 r8:84a52aac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a52a80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a52a80 r8:8027ed34 r7:e0615e60 r6:84a52b00 r5:84b66c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0611fb0 to 0xe0611ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84665d80
INFO: task kworker/1:208:3710 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: b2d3e000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:209:3712 blocked for more than 457 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:209 state:D stack:0 pid:3712 tgid:3712 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0619d84 r8:00000002 r7:60000113 r6:e0619d8c r5:84b68000
r4:84b68000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84b68000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0619e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51180
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84b68000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e042d000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84b8e38c r4:84b8e000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84b8e38c r4:84a52b80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84b68000 r8:84a52bac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a52b80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a52b80 r8:8027ed34 r7:e0615e60 r6:84a52c00 r5:84b68000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0619fb0 to 0xe0619ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a511c0
INFO: task kworker/1:209:3712 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: b2d3e000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:210:3714 blocked for more than 457 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:210 state:D stack:0 pid:3714 tgid:3714 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0621d84 r8:00000002 r7:60000013 r6:e0621d8c r5:84b68c00
r4:84b68c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84b68c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0621e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51100
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84b68c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e043b000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84b8e78c r4:84b8e400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84b8e78c r4:84a52c80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84b68c00 r8:84a52cac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a52c80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a52c80 r8:8027ed34 r7:e0619e60 r6:84a52d00 r5:84b68c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0621fb0 to 0xe0621ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a51100
INFO: task kworker/1:210:3714 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: b307a000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:211:3715 blocked for more than 457 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:211 state:D stack:0 pid:3715 tgid:3715 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e061dd84 r8:00000002 r7:60000113 r6:e061dd8c r5:84b6a400
r4:84b6a400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84b6a400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e061de08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a518c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84b6a400 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0465000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84b8ef8c r4:84b8ec00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84b8ef8c r4:84a52d80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84b6a400 r8:84a52dac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a52d80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a52d80 r8:8027ed34 r7:e0621e60 r6:84a52e00 r5:84b6a400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe061dfb0 to 0xe061dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a51340
INFO: task kworker/1:211:3715 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: b36d5000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:212:3717 blocked for more than 457 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:212 state:D stack:0 pid:3717 tgid:3717 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0629d84 r8:00000002 r7:60000013 r6:e0629d8c r5:84b6b000
r4:84b6b000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84b6b000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0629e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51700
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84b6b000 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e044f000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84b8eb8c r4:84b8e800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84b8eb8c r4:84a52e80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84b6b000 r8:84a52eac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a52e80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a52e80 r8:8027ed34 r7:e061de60 r6:84a52f00 r5:84b6b000
r4:00000001
9fa0: 00000000 00000000 00000000 00000000
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r4:00000000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r5:84b69800 r4:829185c0
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e062de08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51a00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84b69800 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0473000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84b8f38c r4:84b8f000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84b8f38c r4:84a52f80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84b69800 r8:84a52fac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a52f80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a52f80 r8:8027ed34 r7:e061de60 r6:8465c000 r5:84b69800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
dfa0: 00000000 00000000 00000000 00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
r5:00001000 r4:ec917000
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
Not tainted 6.16.0-rc2-syzkaller #0
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0625e08
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
r10:61c88647 r9:84b6c800 r8:8465c0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: b410e000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:215:3724 blocked for more than 457 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:215 state:D stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0635d84 r8:00000002 r7:60000013 r6:e0635d8c r5:84b6d400
r4:84b6d400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84b6d400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: b410e000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r4:00000000
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0631e08
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r4:00000001
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a519c0
INFO: task kworker/1:216:3725 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: b4414000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:217:3728 blocked for more than 457 seconds.
Workqueue: events bpf_prog_free_deferred
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0639e08
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51640
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84b6ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e04f9000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84b9838c r4:84b98000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84b9838c r4:8465c380
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84b6ec00 r8:8465c3ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8465c380
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8465c380 r8:8027ed34 r7:e0635e60 r6:8465c400 r5:84b6ec00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0639fb0 to 0xe0639ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a51d40
INFO: task kworker/1:217:3728 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: b4ca5000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:218:3730 blocked for more than 457 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:218 state:D stack:0 pid:3730 tgid:3730 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0641d84 r8:00000002 r7:60000113 r6:e0641d8c r5:84b6bc00
r4:84b6bc00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84b6bc00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0641e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf4040
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84b6bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0531000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84b9878c r4:84b98400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84b9878c r4:8465c500
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84b6bc00 r8:8465c52c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8465c500
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8465c500 r8:8027ed34 r7:e0639e60 r6:8465c580 r5:84b6bc00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0641fb0 to 0xe0641ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a51e00
INFO: task kworker/1:218:3730 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: b4e3e000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
r4:00000000
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
Exception stack(0xe0361fb0 to 0xe0361ff8)
INFO: task kworker/1:219:3733 blocked for more than 457 seconds.
r4:84b70000
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0645e08
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf4280
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84b70000 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0595000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84b98b8c r4:84b98800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84b98b8c r4:8465c600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84b70000 r8:8465c62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8465c600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8465c600 r8:8027ed34 r7:e0641e60 r6:8465c680 r5:84b70000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0645fb0 to 0xe0645ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84bf41c0
INFO: task kworker/1:219:3733 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r5:00001000 r4:ec917000
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84671280
Workqueue: events bpf_prog_free_deferred
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0649e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf4440
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84b70c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e064f000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84b98f8c r4:84b98c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84b98f8c r4:8465c700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84b70c00 r8:8465c72c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8465c700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8465c700 r8:8027ed34 r7:e0645e60 r6:8465c780 r5:84b70c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0649fb0 to 0xe0649ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84bf4100
INFO: task kworker/1:220:3734 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
r4:00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:221:3736 blocked for more than 457 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:221 state:D stack:0 pid:3736 tgid:3736 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0659d84 r8:00000002 r7:60000113 r6:e0659d8c r5:84b71800
r4:84b71800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84b71800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0659e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf4600
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84b71800 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0663000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84b9938c r4:84b99000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84b9938c r4:8465c800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84b71800 r8:8465c82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8465c800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8465c800 r8:8027ed34 r7:e0649e60 r6:8465c880 r5:84b71800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0659fb0 to 0xe0659ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84bf42c0
INFO: task kworker/1:221:3736 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: b58b1000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:222:3739 blocked for more than 457 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:222 state:D stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0661d84 r8:00000002 r7:60000113 r6:e0661d8c r5:84b72400
r4:84b72400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84b72400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0661e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf4740
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84b72400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b1000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0673000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84b9978c r4:84b99400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84b9978c r4:8465c900
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84b72400 r8:8465c92c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8465c900
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8465c900 r8:8027ed34 r7:e0659e60 r6:8465c980 r5:84b72400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0661fb0 to 0xe0661ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84bf4480
INFO: task kworker/1:222:3739 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: b5b2d000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:223:3740 blocked for more than 458 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:223 state:D stack:0 pid:3740 tgid:3740 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0671d84 r8:00000002 r7:60000113 r6:e0671d8c r5:84b73c00
r4:84b73c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84b73c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0671e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf4ac0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0bf000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0687000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84b99f8c r4:84b99c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84b99f8c r4:8465ca00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84b73c00 r8:8465ca2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8465ca00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8465ca00 r8:8027ed34 r7:e0661e60 r6:8465ca80 r5:84b73c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0671fb0 to 0xe0671ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84bf45c0
INFO: task kworker/1:223:3740 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: b5e66000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:224:3742 blocked for more than 458 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:224 state:D stack:0 pid:3742 tgid:3742 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e063dd84 r8:00000002 r7:60000113 r6:e063dd8c r5:84b74800
r4:84b74800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84b74800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e063de08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf4980
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f0bd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e067b000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84b99b8c r4:84b99800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84b99b8c r4:8465cb00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84b74800 r8:8465cb2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8465cb00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8465cb00 r8:8027ed34 r7:e0671e60 r6:8465cb80 r5:84b74800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe063dfb0 to 0xe063dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84bf46c0
INFO: task kworker/1:224:3742 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: b5e66000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:225:3745 blocked for more than 458 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:225 state:D stack:0 pid:3745 tgid:3745 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0685d84 r8:00000002 r7:60000113 r6:e0685d8c r5:84b75400
r4:84b75400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84b75400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0685e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf4c00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84b75400 r7:00000000 r6:83018200 r5:00001000 r4:7f0c1000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0693000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84b9a38c r4:84b9a000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84b9a38c r4:8465cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84b75400 r8:8465cc2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8465cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8465cc00 r8:8027ed34 r7:e0671e60 r6:8465cc80 r5:84b75400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0685fb0 to 0xe0685ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84bf4a80
INFO: task kworker/1:225:3745 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Workqueue: events bpf_prog_free_deferred
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0691e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf4a80
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84b76000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c3000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e069f000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84b9a78c r4:84b9a400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84b9a78c r4:8465cd00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84b76000 r8:8465cd2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8465cd00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8465cd00 r8:8027ed34 r7:e0685e60 r6:8465cd80 r5:84b76000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0691fb0 to 0xe0691ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84bf4a80
INFO: task kworker/1:226:3746 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: b6545000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
INFO: task kworker/1:227:3748 blocked for more than 458 seconds.
r10:829185c4 r9:e069dd84 r8:00000002 r7:60000013 r6:e069dd8c r5:84b76c00
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e069de08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf4f00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84b76c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c5000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e06a7000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84b9ab8c r4:84b9a800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84b9ab8c r4:8465ce00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84b76c00 r8:8465ce2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8465ce00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8465ce00 r8:8027ed34 r7:e0691e60 r6:8465ce80 r5:84b76c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe069dfb0 to 0xe069dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84bf4c80
INFO: task kworker/1:227:3748 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r4:00000000
1d60: 80010013 ffffffff
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06b1e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85009040
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84b73000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c9000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e06cf000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84b9b38c r4:84b9b000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84b9b38c r4:8465cf00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84b73000 r8:8465cf2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8465cf00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8465cf00 r8:8027ed34 r7:e069de60 r6:8465cf80 r5:84b73000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe06b1fb0 to 0xe06b1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84bf4c80
INFO: task kworker/1:228:3749 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: b69d6000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r5:00001000 r4:ec917000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:229:3752 blocked for more than 458 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:229 state:D stack:0 pid:3752 tgid:3752 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e06b9d84 r8:00000002 r7:60000013 r6:e06b9d8c r5:84b78000
r4:84b78000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84b78000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06b9e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51d40
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84b78000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c7000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e06bb000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r4:8465c480
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84bf4fc0
INFO: task kworker/1:229:3752 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: b6b88000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r4:00000001
Exception stack(0xe0361fb0 to 0xe0361ff8)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
task:kworker/1:230 state:D stack:0 pid:3754 tgid:3754 ppid:2 task_flags:0x4208060 flags:0x00000000
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06cde08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85009300
r5:00001000 r4:e06db000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84b9b78c r4:84b9b400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84b9b78c r4:8500b080
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84b78c00 r8:8500b0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8500b080
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8500b080 r8:8027ed34 r7:e06b1e60 r6:8500b100 r5:84b78c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe06cdfb0 to 0xe06cdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85009080
INFO: task kworker/1:230:3754 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: b7151000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
Exception stack(0xe0361fb0 to 0xe0361ff8)
task:kworker/1:231 state:D stack:0 pid:3757 tgid:3757 ppid:2 task_flags:0x4208060 flags:0x00000000
r4:00000000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
9fa0: 00000000 00000000 00000000 00000000
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06f5e08
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85009600
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84b7a400 r7:00000000 r6:83018200 r5:00001000 r4:7f0cf000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0707000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84b9bf8c r4:84b9bc00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84b9bf8c r4:8500b280
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84b7a400 r8:8500b2ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8500b280
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8500b280 r8:8027ed34 r7:e06d9e60 r6:8500b300 r5:84b7a400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe06f5fb0 to 0xe06f5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:850092c0
INFO: task kworker/1:232:3758 is blocked on a mutex likely owned by task kworker/1:148:3501.
Workqueue: events bpf_prog_free_deferred
r4:00000000
r5:8577c38c r4:8577c000
r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Call trace:
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0705e08
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/1:234 state:D stack:0 pid:3762 tgid:3762 ppid:2 task_flags:0x4208060 flags:0x00000000
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e071de08
r4:00000000
r5:84ba878c r4:84ba8400
r10:00000000 r9:8500b480 r8:8027ed34 r7:e0705e60 r6:8500b500 r5:84b7bc00
r4:85009580
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
INFO: task kworker/1:235:3764 blocked for more than 458 seconds.
r10:829185c4 r9:e0721d84 r8:00000002 r7:60000013 r6:e0721d8c r5:84b7c800
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0721e08
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:61c88647 r9:84b7c800 r8:8500b5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85009700
INFO: task kworker/1:235:3764 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: b8bba000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0725e08
r4:00000000
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
5fa0: 00000000 00000000 00000000 00000000
Call trace:
r5:80010013 r4:80239bd0
r4:00000000
r5:00001000 r4:ec917000
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
INFO: task kworker/1:237:3768 blocked for more than 458 seconds.
r4:84b7e000
r5:84b7e000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0729e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85009d40
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84b7e000 r7:00000000 r6:83018200 r5:00001000 r4:7f063000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfbd1000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ba938c r4:84ba9000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84ba938c r4:8500b780
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84b7e000 r8:8500b7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8500b780
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8500b780 r8:8027ed34 r7:e0725e60 r6:8500b800 r5:84b7e000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0729fb0 to 0xe0729ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85009a40
INFO: task kworker/1:237:3768 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
r4:00000000
r5:00001000 r4:ec917000
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/1:238 state:D stack:0 pid:3770 tgid:3770 ppid:2 task_flags:0x4208060 flags:0x00000000
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e072de08
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501f040
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84b7ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f067000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc1b000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ba9b8c r4:84ba9800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84ba9b8c r4:8500b880
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84b7ec00 r8:8500b8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8500b880
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8500b880 r8:8027ed34 r7:e0729e60 r6:8500b900 r5:84b7ec00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe072dfb0 to 0xe072dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85009b40
INFO: task kworker/1:238:3770 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: b9c32000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:00000001
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
INFO: task kworker/1:239:3771 blocked for more than 458 seconds.
Workqueue: events bpf_prog_free_deferred
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0735e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85009fc0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84b80000 r7:00000000 r6:83018200 r5:00001000 r4:7f065000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfbf1000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ba978c r4:84ba9400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84ba978c r4:8500b980
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84b80000 r8:8500b9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8500b980
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8500b980 r8:8027ed34 r7:e072de60 r6:8500ba00 r5:84b80000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0735fb0 to 0xe0735ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85009b40
INFO: task kworker/1:239:3771 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: ba28a000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:240:3775 blocked for more than 458 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:240 state:D stack:0 pid:3775 tgid:3775 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
r10:829185c4 r9:e0731d84 r8:00000002 r7:60000113 r6:e0731d8c r5:84b80c00
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0731e08
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
r4:00000000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84baa38c r4:84baa000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84baa38c r4:8500ba80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84b80c00 r8:8500baac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8500ba80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8500ba80 r8:8027ed34 r7:e072de60 r6:8500bb00 r5:84b80c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0731fb0 to 0xe0731ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8501f1c0
INFO: task kworker/1:240:3775 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r4:82abf1e4
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:241:3776 blocked for more than 458 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:241 state:D stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e073dd84 r8:00000002 r7:60000113 r6:e073dd8c r5:84b81800
r4:84b81800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84b81800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e073de08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501f280
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84b81800 r7:00000000 r6:83018200 r5:00001000 r4:7f069000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc47000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ba9f8c r4:84ba9c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84ba9f8c r4:8500bb80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84b81800 r8:8500bbac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8500bb80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8500bb80 r8:8027ed34 r7:e0731e60 r6:8500bc00 r5:84b81800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe073dfb0 to 0xe073dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8501f1c0
INFO: task kworker/1:241:3776 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: ba54f000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:242:3778 blocked for more than 458 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:242 state:D stack:0 pid:3778 tgid:3778 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0749d84 r8:00000002 r7:60000113 r6:e0749d8c r5:8476ec00
r4:8476ec00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8476ec00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0749e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501f5c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8476ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd63000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84baa78c r4:84baa400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84baa78c r4:8500bc80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8476ec00 r8:8500bcac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8500bc80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8500bc80 r8:8027ed34 r7:e0731e60 r6:84b30e00 r5:8476ec00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0749fb0 to 0xe0749ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8501f3c0
INFO: task kworker/1:242:3778 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: ba855000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:243:3781 blocked for more than 458 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:243 state:D stack:0 pid:3781 tgid:3781 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0755d84 r8:00000002 r7:60000013 r6:e0755d8c r5:847dec00
r4:847dec00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:847dec00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0755e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501f700
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:847dec00 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd7f000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84baab8c r4:84baa800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84baab8c r4:8500bd00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:847dec00 r8:8500bd2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8500bd00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8500bd00 r8:8027ed34 r7:e0749e60 r6:84b30e80 r5:847dec00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0755fb0 to 0xe0755ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8501f440
INFO: task kworker/1:243:3781 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: ba95d000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:244:3782 blocked for more than 459 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:244 state:D stack:0 pid:3782 tgid:3782 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0759d84 r8:00000002 r7:60000113 r6:e0759d8c r5:8476c800
r4:8476c800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8476c800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0759e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501fa00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8476c800 r7:00000000 r6:83018200 r5:00001000 r4:7f073000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfdc3000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84bab38c r4:84bab000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84bab38c r4:8500bd80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8476c800 r8:8500bdac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8500bd80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8500bd80 r8:8027ed34 r7:e0755e60 r6:84b30f00 r5:8476c800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0759fb0 to 0xe0759ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8501f440
INFO: task kworker/1:244:3782 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: bad00000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:245:3783 blocked for more than 459 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:245 state:D stack:0 pid:3783 tgid:3783 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0741d84 r8:00000002 r7:60000113 r6:e0741d8c r5:84b82400
r4:84b82400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84b82400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0741e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501f880
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84b82400 r7:00000000 r6:83018200 r5:00001000 r4:7f071000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfda1000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84baaf8c r4:84baac00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84baaf8c r4:8500be00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84b82400 r8:8500be2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8500be00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8500be00 r8:8027ed34 r7:e0759e60 r6:8500be80 r5:84b82400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0741fb0 to 0xe0741ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8501f440
INFO: task kworker/1:245:3783 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: baeec000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:246:3785 blocked for more than 459 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:246 state:D stack:0 pid:3785 tgid:3785 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0751d84 r8:00000002 r7:60000113 r6:e0751d8c r5:84b83000
r4:84b83000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84b83000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0751e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501fb40
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84b83000 r7:00000000 r6:83018200 r5:00001000 r4:7f075000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfde7000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84bab78c r4:84bab400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84bab78c r4:8500bf00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84b83000 r8:8500bf2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8500bf00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8500bf00 r8:8027ed34 r7:e0759e60 r6:8500bf80 r5:84b83000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0751fb0 to 0xe0751ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8501f680
INFO: task kworker/1:246:3785 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: bba59000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:247:3788 blocked for more than 459 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:247 state:D stack:0 pid:3788 tgid:3788 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e075dd84 r8:00000002 r7:60000113 r6:e075dd8c r5:84b83c00
r4:84b83c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84b83c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e075de08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501fec0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84b83c00 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dff2d000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84babf8c r4:84babc00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84babf8c r4:85025000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84b83c00 r8:8502502c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85025000
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85025000 r8:8027ed34 r7:e0751e60 r6:85025080 r5:84b83c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe075dfb0 to 0xe075dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8501f9c0
INFO: task kworker/1:247:3788 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: bbfa5000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:248:3789 blocked for more than 459 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:248 state:D stack:0 pid:3789 tgid:3789 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0739d84 r8:00000002 r7:60000113 r6:e0739d8c r5:84b84800
r4:84b84800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84b84800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0739e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501fc80
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84b84800 r7:00000000 r6:83018200 r5:00001000 r4:7f077000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfe01000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84babb8c r4:84bab800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84babb8c r4:85025100
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84b84800 r8:8502512c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85025100
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85025100 r8:8027ed34 r7:e075de60 r6:85025180 r5:84b84800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0739fb0 to 0xe0739ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8501f9c0
INFO: task kworker/1:248:3789 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: bc4de000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:249:3791 blocked for more than 459 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:249 state:D stack:0 pid:3791 tgid:3791 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0765d84 r8:00000002 r7:60000013 r6:e0765d8c r5:84b85400
r4:84b85400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84b85400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0765e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b49dc0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84b85400 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dff67000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84bb478c r4:84bb4400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84bb478c r4:85025200
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84b85400 r8:8502522c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85025200
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85025200 r8:8027ed34 r7:e075de60 r6:85025280 r5:84b85400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0765fb0 to 0xe0765ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8501fb00
INFO: task kworker/1:249:3791 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: bcc41000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:250:3794 blocked for more than 459 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:250 state:D stack:0 pid:3794 tgid:3794 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0769d84 r8:00000002 r7:60000013 r6:e0769d8c r5:84b86c00
r4:84b86c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84b86c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0769e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85009f80
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84b86c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dff45000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84bb438c r4:84bb4000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84bb438c r4:85025300
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84b86c00 r8:8502532c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85025300
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85025300 r8:8027ed34 r7:e0765e60 r6:85025380 r5:84b86c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0769fb0 to 0xe0769ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b496c0
INFO: task kworker/1:250:3794 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
r4:00000000
r5:00001000 r4:ec917000
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e076de08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84664180
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84b86000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dff83000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84bb4b8c r4:84bb4800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84bb4b8c r4:85025400
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84b86000 r8:8502542c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85025400
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85025400 r8:8027ed34 r7:e0765e60 r6:85025480 r5:84b86000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe076dfb0 to 0xe076dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8501ff80
INFO: task kworker/1:251:3796 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: bd06b000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
INFO: task kworker/1:252:3799 blocked for more than 459 seconds.
r5:85030000 r4:829185c0
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0771e08
r4:00000000
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: bd39d000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r4:00000000
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84664600
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84664200
INFO: task kworker/1:253:3800 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: bd83a000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r4:00000001
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Call trace:
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
dfa0: 00000000 00000000 00000000 00000000
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: bd9ff000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:255:3804 blocked for more than 459 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:255 state:D stack:0 pid:3804 tgid:3804 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e47b5d84 r8:00000002 r7:60000113 r6:e47b5d8c r5:84879800
r4:84879800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e47b5e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84664b40
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84879800 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0043000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84bb678c r4:84bb6400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84bb678c r4:85025700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84879800 r8:8502572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85025700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85025700 r8:8027ed34 r7:e077de60 r6:84946080 r5:84879800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe47b5fb0 to 0xe47b5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84664300
INFO: task kworker/1:255:3804 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: bdcc7000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:256:3805 blocked for more than 459 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:256 state:D stack:0 pid:3805 tgid:3805 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e47b9d84 r8:00000002 r7:60000113 r6:e47b9d8c r5:8487a400
r4:8487a400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8487a400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e47b9e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84664780
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8487a400 r7:00000000 r6:83018200 r5:00001000 r4:7f087000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dffdd000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84bb5b8c r4:84bb5800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84bb5b8c r4:85025780
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8487a400 r8:850257ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85025780
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85025780 r8:8027ed34 r7:e47b5e60 r6:84946100 r5:8487a400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe47b9fb0 to 0xe47b9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84664300
INFO: task kworker/1:256:3805 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: bdfc6000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:257:3806 blocked for more than 459 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:257 state:D stack:0 pid:3806 tgid:3806 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e47c1d84 r8:00000002 r7:60000113 r6:e47c1d8c r5:84878c00
r4:84878c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84878c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e47c1e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84664900
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84878c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0003000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84bb5f8c r4:84bb5c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84bb5f8c r4:85025800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84878c00 r8:8502582c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85025800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85025800 r8:8027ed34 r7:e47b5e60 r6:84946180 r5:84878c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe47c1fb0 to 0xe47c1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84664580
INFO: task kworker/1:257:3806 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: be485000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:258:3810 blocked for more than 459 seconds.
Call trace:
r5:8487bc00 r4:829185c0
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e47bde08
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8487bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0025000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84bb638c r4:84bb6000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84bb638c r4:85025880
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8487bc00 r8:850258ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85025880
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85025880 r8:8027ed34 r7:e47b5e60 r6:84946200 r5:8487bc00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe47bdfb0 to 0xe47bdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:846646c0
INFO: task kworker/1:258:3810 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: be485000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:8577c38c r4:8577c000
r4:84b45700
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Not tainted 6.16.0-rc2-syzkaller #0
r4:8487c800
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e47c5e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
r4:00000000
r9:83018205 r8:8487c800 r7:00000000 r6:83018200 r5:00001000 r4:7f091000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e005d000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84bb6b8c r4:84bb6800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84bb6b8c r4:85025900
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8487c800 r8:8502592c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85025900
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85025900 r8:8027ed34 r7:e47b5e60 r6:84946280 r5:8487c800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe47c5fb0 to 0xe47c5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84664880
INFO: task kworker/1:259:3813 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: be485000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r4:84b45700
Exception stack(0xe0361fb0 to 0xe0361ff8)
INFO: task kworker/1:260:3815 blocked for more than 459 seconds.
r10:829185c4 r9:e47c9d84 r8:00000002 r7:60000013 r6:e47c9d8c r5:8487d400
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e47c9e08
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
9fa0: 00000000 00000000 00000000 00000000
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: beb58000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:261:3816 blocked for more than 459 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:261 state:D stack:0 pid:3816 tgid:3816 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e47cdd84 r8:00000002 r7:60000113 r6:e47cdd8c r5:8487e000
r4:8487e000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8487e000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e47cde08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r10:61c88647 r9:8487e000 r8:85025a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
dfa0: 00000000 00000000 00000000 00000000
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
r4:82abf1e4
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r5:8577c38c r4:8577c000
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:262:3819 blocked for more than 459 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:262 state:D stack:0 pid:3819 tgid:3819 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0779d84 r8:00000002 r7:60000113 r6:e0779d8c r5:85031800
r4:85031800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85031800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0779e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85008c00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85031800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0543000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84bb7b8c r4:84bb7800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84bb7b8c r4:85025a80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85031800 r8:85025aac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85025a80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85025a80 r8:8027ed34 r7:e47c9e60 r6:85025b00 r5:85031800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0779fb0 to 0xe0779ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
r4:84664c80
Workqueue: events bpf_prog_free_deferred
1d20: bf4e7000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r5:8577c38c r4:8577c000
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
INFO: task kworker/1:263:3821 blocked for more than 459 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:263 state:D stack:0 pid:3821 tgid:3821 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0775d84 r8:00000002 r7:60000113 r6:e0775d8c r5:85032400
r4:85032400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85032400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0775e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84664a80
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85032400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0523000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84bb778c r4:84bb7400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84bb778c r4:85025b80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85032400 r8:85025bac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85025b80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85025b80 r8:8027ed34 r7:e0779e60 r6:85025c00 r5:85032400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0775fb0 to 0xe0775ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
r4:00000000
1d60: 80010013 ffffffff
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:00000000
r5:00001000 r4:ec917000
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:264:3823 blocked for more than 459 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:264 state:D stack:0 pid:3823 tgid:3823 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e47d5d84 r8:00000002 r7:60000113 r6:e47d5d8c r5:85033000
r4:85033000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85033000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e47d5e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b3f380
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85033000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0573000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84b2838c r4:84b28000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84b2838c r4:85025c80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85033000 r8:85025cac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85025c80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85025c80 r8:8027ed34 r7:e0779e60 r6:85025d00 r5:85033000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe47d5fb0 to 0xe47d5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:850087c0
INFO: task kworker/1:264:3823 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: bf97c000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:265:3824 blocked for more than 459 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:265 state:D stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e47d9d84 r8:00000002 r7:60000113 r6:e47d9d8c r5:85033c00
r4:85033c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85033c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e47d9e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b3f040
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85033c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r4:85025d80
r4:00000001
9fa0: 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
r4:00000000
1d20: c0c4c000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
r4:82abf1e4
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r4:00000000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:266:3826 blocked for more than 460 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:266 state:D stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e47ddd84 r8:00000002 r7:60000113 r6:e47ddd8c r5:85034800
r4:85034800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85034800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e47dde08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b3f4c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85034800 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0583000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84b2878c r4:84b28400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84b2878c r4:85025e80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85034800 r8:85025eac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85025e80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85025e80 r8:8027ed34 r7:e47d5e60 r6:85025f00 r5:85034800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe47ddfb0 to 0xe47ddff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b3f080
INFO: task kworker/1:266:3826 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: c1001000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:267:3829 blocked for more than 460 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:267 state:D stack:0 pid:3829 tgid:3829 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e47e1d84 r8:00000002 r7:60000013 r6:e47e1d8c r5:85035400
r4:85035400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85035400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e47e1e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b3f600
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84b28b8c r4:85025f80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85035400 r8:85025fac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85025f80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85025f80 r8:8027ed34 r7:e47dde60 r6:84b38000 r5:85035400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe47e1fb0 to 0xe47e1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b3f340
INFO: task kworker/1:267:3829 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: c122b000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:268:3830 blocked for more than 460 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:268 state:D stack:0 pid:3830 tgid:3830 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e47e5d84 r8:00000002 r7:60000013 r6:e47e5d8c r5:85036000
r4:85036000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85036000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e47e5e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b3f900
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85036000 r7:00000000 r6:83018200 r5:00001000 r4:7f0d3000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e47f5000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84b2938c r4:84b29000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84b2938c r4:84b38080
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85036000 r8:84b380ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b38080
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b38080 r8:8027ed34 r7:e47e1e60 r6:84b38100 r5:85036000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe47e5fb0 to 0xe47e5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b3f540
INFO: task kworker/1:268:3830 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: c1606000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:269:3832 blocked for more than 460 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:269 state:D stack:0 pid:3832 tgid:3832 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e47e9d84 r8:00000002 r7:60000113 r6:e47e9d8c r5:85036c00
r4:85036c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85036c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e47e9e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b3f800
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85036c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0d1000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e47a2000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84b28f8c r4:84b28c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84b28f8c r4:84b38180
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85036c00 r8:84b381ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b38180
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b38180 r8:8027ed34 r7:e47e5e60 r6:84b38200 r5:85036c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe47e9fb0 to 0xe47e9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b3f480
INFO: task kworker/1:269:3832 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: c17aa000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:270:3835 blocked for more than 460 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:270 state:D stack:0 pid:3835 tgid:3835 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e47edd84 r8:00000002 r7:60000113 r6:e47edd8c r5:85030c00
r4:85030c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85030c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e47ede08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b3fa80
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85030c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0d5000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e8807000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84b2978c r4:84b29400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84b2978c r4:84b38280
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85030c00 r8:84b382ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b38280
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b38280 r8:8027ed34 r7:e47e5e60 r6:84b38300 r5:85030c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe47edfb0 to 0xe47edff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b3f700
INFO: task kworker/1:270:3835 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: c1e3b000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:271:3837 blocked for more than 460 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:271 state:D stack:0 pid:3837 tgid:3837 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e8805d84 r8:00000002 r7:60000013 r6:e8805d8c r5:85038000
r4:85038000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85038000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8805e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b3fc00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85038000 r7:00000000 r6:83018200 r5:00001000 r4:7f0d7000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e8817000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84b29b8c r4:84b29800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84b29b8c r4:84b38380
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85038000 r8:84b383ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b38380
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b38380 r8:8027ed34 r7:e47ede60 r6:84b38400 r5:85038000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe8805fb0 to 0xe8805ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b3f880
INFO: task kworker/1:271:3837 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: c30a7000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:272:3839 blocked for more than 460 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:272 state:D stack:0 pid:3839 tgid:3839 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e8815d84 r8:00000002 r7:60000113 r6:e8815d8c r5:85038c00
r4:85038c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85038c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8815e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b3fd40
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85038c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0d9000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e8823000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84b29f8c r4:84b29c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84b29f8c r4:84b38480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85038c00 r8:84b384ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b38480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b38480 r8:8027ed34 r7:e8805e60 r6:84b38500 r5:85038c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe8815fb0 to 0xe8815ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b3fa00
INFO: task kworker/1:272:3839 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: c3284000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:273:3841 blocked for more than 460 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:273 state:D stack:0 pid:3841 tgid:3841 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e8821d84 r8:00000002 r7:60000113 r6:e8821d8c r5:85039800
r4:85039800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85039800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8821e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b3ff00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85039800 r7:00000000 r6:83018200 r5:00001000 r4:7f0db000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e882f000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84b2a38c r4:84b2a000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84b2a38c r4:84b38580
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85039800 r8:84b385ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b38580
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b38580 r8:8027ed34 r7:e8815e60 r6:84b38600 r5:85039800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe8821fb0 to 0xe8821ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b3fbc0
INFO: task kworker/1:273:3841 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: c340e000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:274:3844 blocked for more than 460 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:274 state:D stack:0 pid:3844 tgid:3844 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e882dd84 r8:00000002 r7:60000113 r6:e882dd8c r5:8503a400
r4:8503a400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8503a400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e882de08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8467a300
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8503a400 r7:00000000 r6:83018200 r5:00001000 r4:7f0e1000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e8857000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84b2af8c r4:84b2ac00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84b2af8c r4:84b38680
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8503a400 r8:84b386ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b38680
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b38680 r8:8027ed34 r7:e8821e60 r6:84b38700 r5:8503a400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe882dfb0 to 0xe882dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b3fd80
INFO: task kworker/1:274:3844 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: c380d000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
INFO: task kworker/1:275:3845 blocked for more than 460 seconds.
r10:829185c4 r9:e47f9d84 r8:00000002 r7:60000113 r6:e47f9d8c r5:8503b000
r4:8503b000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8503b000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e47f9e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a32140
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8503b000 r7:00000000 r6:83018200 r5:00001000 r4:7f0dd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e883b000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84b2a78c r4:84b2a400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84b2a78c r4:84b38780
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8503b000 r8:84b387ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b38780
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b38780 r8:8027ed34 r7:e882de60 r6:84b38800 r5:8503b000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe47f9fb0 to 0xe47f9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b3fd80
INFO: task kworker/1:275:3845 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: c4579000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:276:3847 blocked for more than 460 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:276 state:D stack:0 pid:3847 tgid:3847 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e8839d84 r8:00000002 r7:60000113 r6:e8839d8c r5:8503bc00
r4:8503bc00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8503bc00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8839e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8467a100
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8503bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0df000
r5:00001000 r4:e884b000
r7:ddde2d40 r6:83018200 r5:84b2ab8c r4:84b38880
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe8839fb0 to 0xe8839ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8467a040
INFO: task kworker/1:276:3847 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: c48e4000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
r5:00001000 r4:ec917000
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
Exception stack(0xe0361fb0 to 0xe0361ff8)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r10:829185c4 r9:e8855d84 r8:00000002 r7:60000113 r6:e8855d8c r5:8503c800
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r4:00000000
r5:00001000 r4:e887d000
r5:84b2bb8c r4:84b2b800
r10:00000000 r9:84b38980 r8:8027ed34 r7:e882de60 r6:84b38a00 r5:8503c800
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8467a180
INFO: task kworker/1:277:3849 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: c4fcf000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
r5:8503d400 r4:829185c0
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
r5:84b2b38c r4:84b2b000
Exception stack(0xe8861fb0 to 0xe8861ff8)
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: c4fcf000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
INFO: task kworker/1:279:3853 blocked for more than 460 seconds.
r10:829185c4 r9:e886dd84 r8:00000002 r7:60000113 r6:e886dd8c r5:8503e000
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
r5:00001000 r4:e886f000
r5:84b2b78c r4:84b2b400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84b2b78c r4:84b38b80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8503e000 r8:84b38bac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b38b80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b38b80 r8:8027ed34 r7:e8855e60 r6:84b38c00 r5:8503e000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe886dfb0 to 0xe886dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8467a480
INFO: task kworker/1:279:3853 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: c5624000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:280:3855 blocked for more than 460 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:280 state:D stack:0 pid:3855 tgid:3855 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e8879d84 r8:00000002 r7:60000113 r6:e8879d8c r5:8503ec00
r4:8503ec00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8503ec00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8879e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8467aa80
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8503ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0eb000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ea899000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8507038c r4:85070000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8507038c r4:84b38c80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8503ec00 r8:84b38cac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b38c80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b38c80 r8:8027ed34 r7:e8855e60 r6:84b38d00 r5:8503ec00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe8879fb0 to 0xe8879ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8467a5c0
INFO: task kworker/1:280:3855 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: c5a12000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/1:281 state:D stack:0 pid:3858 tgid:3858 ppid:2 task_flags:0x4208060 flags:0x00000000
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea891e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8467ac00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85048000 r7:00000000 r6:83018200 r5:00001000 r4:7f00d000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:df973000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8507078c r4:85070400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8507078c r4:84b38e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85048000 r8:84b38e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b38e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b38e00 r8:8027ed34 r7:e8879e60 r6:84b38e80 r5:85048000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea891fb0 to 0xea891ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8467a900
INFO: task kworker/1:281:3858 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: c64e0000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:282:3860 blocked for more than 460 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:282 state:D stack:0 pid:3860 tgid:3860 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e03a1d84 r8:00000002 r7:60000113 r6:e03a1d8c r5:85048c00
r4:85048c00
r5:85048c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e03a1e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8467ad80
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85048c00 r7:00000000 r6:83018200 r5:00001000 r4:7f029000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:df9a9000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85070b8c r4:85070800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85070b8c r4:84b38f00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85048c00 r8:84b38f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b38f00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b38f00 r8:8027ed34 r7:ea891e60 r6:84b38f80 r5:85048c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe03a1fb0 to 0xe03a1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8467aa00
INFO: task kworker/1:282:3860 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: c682c000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
r4:85049800
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04dde08
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
r5:85070f8c r4:85070c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:284:3864 blocked for more than 460 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8504a400 r7:00000000 r6:83018200 r5:00001000 r4:7f033000
r5:00001000 r4:dfcb1000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85071f8c r4:85071c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85071f8c r4:84a38080
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8504a400 r8:84a380ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a38080
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a38080 r8:8027ed34 r7:e04dde60 r6:84a38100 r5:8504a400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe05b1fb0 to 0xe05b1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8467ad00
INFO: task kworker/1:284:3864 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:285:3866 blocked for more than 460 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:285 state:D stack:0 pid:3866 tgid:3866 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0669d84 r8:00000002 r7:60000113 r6:e0669d8c r5:8504b000
r4:8504b000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8504b000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0669e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r4:00000000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:00000000 r9:84a38180 r8:8027ed34 r7:e05b1e60 r6:84a38200 r5:8504b000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
r4:8467ad00
Workqueue: events bpf_prog_free_deferred
r4:00000000
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:286:3868 blocked for more than 460 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:286 state:D stack:0 pid:3868 tgid:3868 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e8849d84 r8:00000002 r7:60000013 r6:e8849d8c r5:8504c800
r4:8504c800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8504c800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8849e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
r4:00000000
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r4:84a38280
r4:00000001
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: c821e000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:287:3869 blocked for more than 461 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:287 state:D stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e068dd84 r8:00000002 r7:60000113 r6:e068dd8c r5:8487ec00
r4:8487ec00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8487ec00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e068de08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849023c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8487ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc79000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85071b8c r4:85071800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85071b8c r4:84a38380
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8487ec00 r8:84a383ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a38380
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a38380 r8:8027ed34 r7:e05b1e60 r6:84946400 r5:8487ec00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe068dfb0 to 0xe068dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84902100
INFO: task kworker/1:287:3869 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r10:829185c4 r9:e06e1d84 r8:00000002 r7:60000113 r6:e06e1d8c r5:8496ec00
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
INFO: task kworker/1:289:3875 blocked for more than 461 seconds.
Workqueue: events bpf_prog_free_deferred
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0681e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84902a00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8504d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfe6d000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85072f8c r4:85072c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85072f8c r4:84a38480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8504d400 r8:84a384ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a38480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a38480 r8:8027ed34 r7:e06e1e60 r6:84a38500 r5:8504d400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0681fb0 to 0xe0681ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
INFO: task kworker/1:290:3876 blocked for more than 461 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:290 state:D stack:0 pid:3876 tgid:3876 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e06fdd84 r8:00000002 r7:60000013 r6:e06fdd8c r5:8504e000
r4:8504e000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8504e000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06fde08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84902700
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8504e000 r7:00000000 r6:83018200 r5:00001000 r4:7f037000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfe11000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8507278c r4:85072400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8507278c r4:84a38580
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8504e000 r8:84a385ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a38580
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a38580 r8:8027ed34 r7:e0681e60 r6:84a38600 r5:8504e000
dfa0: 00000000 00000000 00000000 00000000
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r5:00001000 r4:ec917000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:291:3878 blocked for more than 461 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:291 state:D stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0699d84 r8:00000002 r7:60000113 r6:e0699d8c r5:8504bc00
r4:8504bc00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8504bc00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0699e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84902900
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8504bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f039000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfe41000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85072b8c r4:85072800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:61c88647 r9:8504bc00 r8:84a386ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
r4:82abf1e4
r4:00000000
r5:00001000 r4:ec917000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
1fa0: 00000000 00000000 00000000 00000000
INFO: task kworker/1:292:3880 blocked for more than 461 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:292 state:D stack:0 pid:3880 tgid:3880 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:ea8a9d84 r8:00000002 r7:60000113 r6:ea8a9d8c r5:85050000
r4:85050000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85050000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8a9e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84902d40
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85050000 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e037d000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8507338c r4:85073000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8507338c r4:84a38780
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85050000 r8:84a387ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a38780
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a38780 r8:8027ed34 r7:e0681e60 r6:84a38800 r5:85050000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea8a9fb0 to 0xea8a9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84902800
INFO: task kworker/1:292:3880 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: cae9c000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
r4:e0361dc0
r4:00000000
r5:00001000 r4:ec917000
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:293:3883 blocked for more than 461 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:293 state:D stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:ea8b1d84 r8:00000002 r7:60000013 r6:ea8b1d8c r5:85050c00
r4:85050c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85050c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8b1e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84902f00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85050c00 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e03a3000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8507378c r4:85073400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8507378c r4:84a38880
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85050c00 r8:84a388ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a38880
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a38880 r8:8027ed34 r7:ea8a9e60 r6:84a38900 r5:85050c00
1fa0: 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
Exception stack(0xe0361d20 to 0xe0361d68)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r5:8577c38c r4:8577c000
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:294:3884 blocked for more than 461 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:294 state:D stack:0 pid:3884 tgid:3884 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:ea8b5d84 r8:00000002 r7:60000113 r6:ea8b5d8c r5:85053000
r4:85053000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85053000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8b5e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850020c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85053000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e03c3000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r4:84a38980
5fa0: 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
r4:00000000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:94:3885 blocked for more than 461 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:94 state:D stack:0 pid:3885 tgid:3885 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:ea8b9d84 r8:00000002 r7:60000113 r6:ea8b9d8c r5:85053c00
r4:85053c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85053c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8b9e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r9:83018005 r8:85053c00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000
r10:61c88647 r9:85053c00 r8:8494652c r7:82804d40 r6:dddced40 r5:dddced60
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
Exception stack(0xe0361fb0 to 0xe0361ff8)
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:295 state:D stack:0 pid:3887 tgid:3887 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:ea8bdd84 r8:00000002 r7:60000113 r6:ea8bdd8c r5:85051800
r4:85051800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85051800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8bde08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85002740
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85051800 r7:00000000 r6:83018200 r5:00001000 r4:7f049000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0407000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8507838c r4:85078000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8507838c r4:84a38b00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85051800 r8:84a38b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a38b00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a38b00 r8:8027ed34 r7:ea8b5e60 r6:84a38b80 r5:85051800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea8bdfb0 to 0xea8bdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84902940
INFO: task kworker/1:295:3887 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: cbe03000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:296:3889 blocked for more than 461 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:296 state:D stack:0 pid:3889 tgid:3889 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r4:85055400
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r5:85073f8c r4:85073c00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85002140
INFO: task kworker/1:296:3889 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: cbe03000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/0:95 state:D stack:0 pid:3891 tgid:3891 ppid:2 task_flags:0x4208060 flags:0x00000000
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
Exception stack(0xea8c9fb0 to 0xea8c9ff8)
r4:84907c00
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: cc2c4000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:297:3893 blocked for more than 461 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:297 state:D stack:0 pid:3893 tgid:3893 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:ea8cdd84 r8:00000002 r7:60000113 r6:ea8cdd8c r5:85056c00
r4:85056c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85056c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8cde08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850028c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85056c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0417000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8507878c r4:85078400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8507878c r4:84a38d80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85056c00 r8:84a38dac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a38d80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a38d80 r8:8027ed34 r7:ea8bde60 r6:84a38e00 r5:85056c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea8cdfb0 to 0xea8cdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:850025c0
INFO: task kworker/1:297:3893 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: cc622000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/1:298 state:D stack:0 pid:3896 tgid:3896 ppid:2 task_flags:0x4208060 flags:0x00000000
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:300:3900 blocked for more than 461 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:300 state:D stack:0 pid:3900 tgid:3900 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:ea8add84 r8:00000002 r7:60000113 r6:ea8add8c r5:8504ec00
r4:8504ec00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8504ec00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8ade08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85002cc0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8504ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0463000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8507938c r4:85079000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8507938c r4:84bf5080
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8504ec00 r8:84bf50ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84bf5080
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84bf5080 r8:8027ed34 r7:ea8a5e60 r6:84bf5100 r5:8504ec00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea8adfb0 to 0xea8adff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85002940
INFO: task kworker/1:300:3900 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: cd382000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:301:3903 blocked for more than 461 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:301 state:D stack:0 pid:3903 tgid:3903 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:ea8d1d84 r8:00000002 r7:60000013 r6:ea8d1d8c r5:85058000
r4:85058000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85058000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8d1e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85002e40
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0477000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8507978c r4:85079400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8507978c r4:84bf5180
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85058000 r8:84bf51ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84bf5180
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84bf5180 r8:8027ed34 r7:ea8ade60 r6:84bf5200 r5:85058000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea8d1fb0 to 0xea8d1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:850029c0
INFO: task kworker/1:301:3903 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: cd836000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:302:3904 blocked for more than 461 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:302 state:D stack:0 pid:3904 tgid:3904 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:ea8ddd84 r8:00000002 r7:60000013 r6:ea8ddd8c r5:849b9800
r4:849b9800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:849b9800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8dde08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85002fc0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849b9800 r7:00000000 r6:83018200 r5:00001000 r4:7f055000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e049f000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85079b8c r4:85079800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85079b8c r4:84bf5280
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849b9800 r8:84bf52ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84bf5280
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84bf5280 r8:8027ed34 r7:ea8d1e60 r6:84946600 r5:849b9800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea8ddfb0 to 0xea8ddff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:850029c0
INFO: task kworker/1:302:3904 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: cdbae000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:303:3906 blocked for more than 461 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:303 state:D stack:0 pid:3906 tgid:3906 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:ea8d5d84 r8:00000002 r7:60000113 r6:ea8d5d8c r5:85059800
r4:85059800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85059800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8d5e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501d3c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85059800 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0549000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8507a38c r4:8507a000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8507a38c r4:84bf5300
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85059800 r8:84bf532c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84bf5300
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84bf5300 r8:8027ed34 r7:ea8dde60 r6:84bf5380 r5:85059800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea8d5fb0 to 0xea8d5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85002dc0
INFO: task kworker/1:303:3906 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: cdbae000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:96:3908 blocked for more than 462 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:96 state:D stack:0 pid:3908 tgid:3908 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:ea8e1d84 r8:00000002 r7:60000113 r6:ea8e1d8c r5:85058c00
r4:85058c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85058c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8e1e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a32680
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:85058c00 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd89000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84adf78c r4:84adf400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84adf78c r4:84946680
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85058c00 r8:849466ac r7:82804d40 r6:dddced40 r5:dddced60
r4:84946680
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84946680 r8:8027ed34 r7:e0391e60 r6:84bf5400 r5:85058c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea8e1fb0 to 0xea8e1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84907a40
INFO: task kworker/0:96:3908 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: cdee8000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
task:kworker/1:304 state:D stack:0 pid:3910 tgid:3910 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:ea8e5d84 r8:00000002 r7:60000113 r6:ea8e5d8c r5:8505b000
r4:8505b000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8505b000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8e5e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501d040
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8505b000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e050f000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85079f8c r4:85079c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85079f8c r4:84bf5480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8505b000 r8:84bf54ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84bf5480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84bf5480 r8:8027ed34 r7:ea8d5e60 r6:84bf5500 r5:8505b000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea8e5fb0 to 0xea8e5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8501d0c0
INFO: task kworker/1:304:3910 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: ce23e000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:305:3911 blocked for more than 462 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:305 state:D stack:0 pid:3911 tgid:3911 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:ea8d9d84 r8:00000002 r7:60000113 r6:ea8d9d8c r5:8505bc00
r4:8505bc00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8505bc00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8d9e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501d540
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8505bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e05cd000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8507a78c r4:8507a400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8507a78c r4:84bf5580
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8505bc00 r8:84bf55ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84bf5580
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84bf5580 r8:8027ed34 r7:ea8d5e60 r6:84bf5600 r5:8505bc00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea8d9fb0 to 0xea8d9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8501d300
INFO: task kworker/1:305:3911 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: ce3b7000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:306:3914 blocked for more than 462 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:306 state:D stack:0 pid:3914 tgid:3914 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:ea8e9d84 r8:00000002 r7:60000013 r6:ea8e9d8c r5:8505c800
r4:8505c800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8505c800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8e9e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501d680
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8505c800 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e05ed000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8507ab8c r4:8507a800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8507ab8c r4:84bf5680
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8505c800 r8:84bf56ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84bf5680
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84bf5680 r8:8027ed34 r7:ea8d9e60 r6:84bf5700 r5:8505c800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea8e9fb0 to 0xea8e9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8501d340
INFO: task kworker/1:306:3914 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: ce6d4000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r5:00001000 r4:ec917000
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:307:3917 blocked for more than 462 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:307 state:D stack:0 pid:3917 tgid:3917 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:ea8edd84 r8:00000002 r7:60000013 r6:ea8edd8c r5:8505d400
r4:8505d400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8505d400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8ede08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501d800
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8505d400 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e065b000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8507af8c r4:8507ac00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8507af8c r4:84bf5780
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8505d400 r8:84bf57ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84bf5780
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84bf5780 r8:8027ed34 r7:ea8e9e60 r6:84bf5800 r5:8505d400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea8edfb0 to 0xea8edff8)
dfa0: 00000000 00000000 00000000 00000000
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:308:3918 blocked for more than 462 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8f1e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501d9c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8505e000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0677000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8507b38c r4:8507b000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8507b38c r4:84bf5880
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8505e000 r8:84bf58ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84bf5880
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84bf5880 r8:8027ed34 r7:ea8ede60 r6:84bf5900 r5:8505e000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea8f1fb0 to 0xea8f1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8501d500
INFO: task kworker/1:308:3918 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: cee77000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8f5e08
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r4:84bf5980
5fa0: 00000000 00000000 00000000 00000000
r4:8501d840
INFO: task kworker/1:309:3920 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: cefac000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:310:3922 blocked for more than 462 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:310 state:D stack:0 pid:3922 tgid:3922 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:ea8f9d84 r8:00000002 r7:60000113 r6:ea8f9d8c r5:8505a400
r4:8505a400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8505a400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8f9e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501dcc0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8505a400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e06a9000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8507bb8c r4:8507b800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8507bb8c r4:84bf5a80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8505a400 r8:84bf5aac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84bf5a80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84bf5a80 r8:8027ed34 r7:ea8f5e60 r6:84bf5b00 r5:8505a400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea8f9fb0 to 0xea8f9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8501d940
INFO: task kworker/1:310:3922 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: cf8bc000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:311:3924 blocked for more than 462 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:311 state:D stack:0 pid:3924 tgid:3924 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:ea8fdd84 r8:00000002 r7:60000013 r6:ea8fdd8c r5:85060000
r4:85060000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85060000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8fde08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501de00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85060000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e06c3000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8507bf8c r4:8507bc00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8507bf8c r4:84bf5b80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85060000 r8:84bf5bac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84bf5b80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84bf5b80 r8:8027ed34 r7:ea8f9e60 r6:84bf5c00 r5:85060000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea8fdfb0 to 0xea8fdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8501d940
INFO: task kworker/1:311:3924 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: cf8bd000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:312:3926 blocked for more than 462 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:312 state:D stack:0 pid:3926 tgid:3926 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:ea909d84 r8:00000002 r7:60000113 r6:ea909d8c r5:85060c00
r4:85060c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85060c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea909e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501df80
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85060c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e06f9000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8508438c r4:85084000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8508438c r4:84bf5c80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85060c00 r8:84bf5cac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84bf5c80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84bf5c80 r8:8027ed34 r7:ea8fde60 r6:84bf5d00 r5:85060c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea909fb0 to 0xea909ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8501dc80
INFO: task kworker/1:312:3926 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: cfa23000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
r5:00001000 r4:ea8a1000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8508478c r4:85084400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8508478c r4:84bf5d80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85061800 r8:84bf5dac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84bf5d80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84bf5d80 r8:8027ed34 r7:ea909e60 r6:84bf5e00 r5:85061800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea911fb0 to 0xea911ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8501dd80
INFO: task kworker/1:313:3928 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: d0398000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:314:3930 blocked for more than 462 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:314 state:D stack:0 pid:3930 tgid:3930 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:ea915d84 r8:00000002 r7:60000113 r6:ea915d8c r5:85062400
r4:85062400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85062400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea915e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85026500
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85062400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b1000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ea935000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8508538c r4:85085000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8508538c r4:84bf5e80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85062400 r8:84bf5eac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84bf5e80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84bf5e80 r8:8027ed34 r7:ea911e60 r6:84bf5f00 r5:85062400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea915fb0 to 0xea915ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85026080
INFO: task kworker/1:314:3930 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: d058a000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:315:3932 blocked for more than 462 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:315 state:D stack:0 pid:3932 tgid:3932 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:ea91dd84 r8:00000002 r7:60000013 r6:ea91dd8c r5:85063000
r4:85063000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85063000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea91de08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85026040
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85063000 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ea919000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85084b8c r4:85084800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85084b8c r4:84bf5f80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85063000 r8:84bf5fac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84bf5f80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84bf5f80 r8:8027ed34 r7:ea915e60 r6:84672000 r5:85063000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea91dfb0 to 0xea91dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85026240
INFO: task kworker/1:315:3932 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: d058a000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:316:3934 blocked for more than 462 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:316 state:D stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:ea92dd84 r8:00000002 r7:60000113 r6:ea92dd8c r5:85063c00
r4:85063c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85063c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea92de08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85026300
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85063c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ea925000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85084f8c r4:85084c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85084f8c r4:84672080
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85063c00 r8:846720ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84672080
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84672080 r8:8027ed34 r7:ea915e60 r6:84672100 r5:85063c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea92dfb0 to 0xea92dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85026180
INFO: task kworker/1:316:3934 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: d0cbd000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:317:3936 blocked for more than 462 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:317 state:D stack:0 pid:3936 tgid:3936 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:ea939d84 r8:00000002 r7:60000113 r6:ea939d8c r5:85064800
r4:85064800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85064800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea939e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85026900
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85064800 r7:00000000 r6:83018200 r5:00001000 r4:7f0bf000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ea961000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85085f8c r4:85085c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85085f8c r4:84672180
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85064800 r8:846721ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84672180
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84672180 r8:8027ed34 r7:ea915e60 r6:84672200 r5:85064800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea939fb0 to 0xea939ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85026380
INFO: task kworker/1:317:3936 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: d0f57000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:318:3937 blocked for more than 462 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:318 state:D stack:0 pid:3937 tgid:3937 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:ea949d84 r8:00000002 r7:60000113 r6:ea949d8c r5:849bbc00
r4:849bbc00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:849bbc00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea949e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850266c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849bbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0bb000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ea941000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8508578c r4:85085400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8508578c r4:84672280
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849bbc00 r8:846722ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84672280
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84672280 r8:8027ed34 r7:ea939e60 r6:84946700 r5:849bbc00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea949fb0 to 0xea949ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85026380
INFO: task kworker/1:318:3937 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: d12db000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:319:3939 blocked for more than 462 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:319 state:D stack:0 pid:3939 tgid:3939 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:ea959d84 r8:00000002 r7:60000113 r6:ea959d8c r5:849bc800
r4:849bc800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:849bc800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea959e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85026800
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849bc800 r7:00000000 r6:83018200 r5:00001000 r4:7f0bd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ea951000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85085b8c r4:85085800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85085b8c r4:84672300
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849bc800 r8:8467232c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84672300
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84672300 r8:8027ed34 r7:ea939e60 r6:84946780 r5:849bc800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea959fb0 to 0xea959ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85026540
INFO: task kworker/1:319:3939 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: d15a1000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:320:3942 blocked for more than 462 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:320 state:D stack:0 pid:3942 tgid:3942 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:ea97dd84 r8:00000002 r7:60000113 r6:ea97dd8c r5:849bd400
r4:849bd400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:849bd400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea97de08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85026d40
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849bd400 r7:00000000 r6:83018200 r5:00001000 r4:7f0c5000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ea98d000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85086b8c r4:85086800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85086b8c r4:84672380
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849bd400 r8:846723ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84672380
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84672380 r8:8027ed34 r7:ea939e60 r6:84946800 r5:849bd400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea97dfb0 to 0xea97dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85026700
INFO: task kworker/1:320:3942 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: d18a7000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:321:3943 blocked for more than 462 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:321 state:D stack:0 pid:3943 tgid:3943 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:ea981d84 r8:00000002 r7:60000013 r6:ea981d8c r5:849be000
r4:849be000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:849be000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea981e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85026a40
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849be000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c1000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ea96d000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8508638c r4:85086000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8508638c r4:84672400
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849be000 r8:8467242c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84672400
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84672400 r8:8027ed34 r7:ea97de60 r6:84946880 r5:849be000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea981fb0 to 0xea981ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85026700
INFO: task kworker/1:321:3943 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: d1a69000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:322:3946 blocked for more than 462 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:322 state:D stack:0 pid:3946 tgid:3946 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:ea995d84 r8:00000002 r7:60000113 r6:ea995d8c r5:849bb000
r4:849bb000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:849bb000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea995e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85026bc0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849bb000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c3000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ea979000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8508678c r4:85086400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8508678c r4:84672480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849bb000 r8:846724ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84672480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84672480 r8:8027ed34 r7:ea97de60 r6:84946900 r5:849bb000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea995fb0 to 0xea995ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:850268c0
INFO: task kworker/1:322:3946 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: d3413000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:323:3948 blocked for more than 463 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:323 state:D stack:0 pid:3948 tgid:3948 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:ea9a5d84 r8:00000002 r7:60000113 r6:ea9a5d8c r5:849ba400
r4:849ba400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:849ba400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9a5e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85026ec0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849ba400 r7:00000000 r6:83018200 r5:00001000 r4:7f0c7000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ea9a1000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85086f8c r4:85086c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85086f8c r4:84672500
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849ba400 r8:8467252c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84672500
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84672500 r8:8027ed34 r7:ea97de60 r6:84946980 r5:849ba400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea9a5fb0 to 0xea9a5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85026b40
INFO: task kworker/1:323:3948 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: d375b000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:324:3949 blocked for more than 463 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:324 state:D stack:0 pid:3949 tgid:3949 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:ea9a9d84 r8:00000002 r7:60000113 r6:ea9a9d8c r5:849bec00
r4:849bec00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:849bec00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9a9e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8500d0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849bec00 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfb95000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85087b8c r4:85087800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85087b8c r4:84672580
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849bec00 r8:846725ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84672580
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84672580 r8:8027ed34 r7:ea9a5e60 r6:84946a00 r5:849bec00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea9a9fb0 to 0xea9a9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85026b40
INFO: task kworker/1:324:3949 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: d3a2d000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:325:3951 blocked for more than 463 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:325 state:D stack:0 pid:3951 tgid:3951 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e880dd84 r8:00000002 r7:60000013 r6:e880dd8c r5:849b8c00
r4:849b8c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:849b8c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e880de08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850268c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849b8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ea9b1000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8508738c r4:85087000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8508738c r4:84672600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849b8c00 r8:8467262c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84672600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84672600 r8:8027ed34 r7:ea9a9e60 r6:84946a80 r5:849b8c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe880dfb0 to 0xe880dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85026cc0
INFO: task kworker/1:325:3951 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: d3c9c000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:326:3953 blocked for more than 463 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:326 state:D stack:0 pid:3953 tgid:3953 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e8829d84 r8:00000002 r7:60000113 r6:e8829d8c r5:849b8000
r4:849b8000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:849b8000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8829e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84907280
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849b8000 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfb61000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8508778c r4:85087400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8508778c r4:84672680
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849b8000 r8:846726ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84672680
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84672680 r8:8027ed34 r7:ea9a9e60 r6:84946b00 r5:849b8000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe8829fb0 to 0xe8829ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85026e80
INFO: task kworker/1:326:3953 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: d3d90000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:327:3955 blocked for more than 463 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:327 state:D stack:0 pid:3955 tgid:3955 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e8841d84 r8:00000002 r7:60000013 r6:e8841d8c r5:847f0000
r4:847f0000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:847f0000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8841e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8500d300
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:847f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f061000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfbc3000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85087f8c r4:85087c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85087f8c r4:84672700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:847f0000 r8:8467272c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84672700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84672700 r8:8027ed34 r7:ea9a9e60 r6:84946b80 r5:847f0000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe8841fb0 to 0xe8841ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85026f00
INFO: task kworker/1:327:3955 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: d449f000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:328:3958 blocked for more than 463 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:328 state:D stack:0 pid:3958 tgid:3958 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e8851d84 r8:00000002 r7:60000113 r6:e8851d8c r5:847f0c00
r4:847f0c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:847f0c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8851e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8500d580
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:847f0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f067000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc69000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8508c78c r4:8508c400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8508c78c r4:84672780
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:847f0c00 r8:846727ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84672780
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84672780 r8:8027ed34 r7:e8841e60 r6:84946c00 r5:847f0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe8851fb0 to 0xe8851ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8500d200
INFO: task kworker/1:328:3958 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: d4a62000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:329:3959 blocked for more than 463 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:329 state:D stack:0 pid:3959 tgid:3959 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e885dd84 r8:00000002 r7:60000113 r6:e885dd8c r5:847f1800
r4:847f1800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:847f1800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e885de08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8500d480
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:847f1800 r7:00000000 r6:83018200 r5:00001000 r4:7f063000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfbff000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8508c38c r4:8508c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8508c38c r4:84672800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:847f1800 r8:8467282c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84672800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84672800 r8:8027ed34 r7:e8851e60 r6:84946c80 r5:847f1800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe885dfb0 to 0xe885dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8500d200
INFO: task kworker/1:329:3959 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: d4ce5000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:330:3963 blocked for more than 463 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:330 state:D stack:0 pid:3963 tgid:3963 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e8875d84 r8:00000002 r7:60000113 r6:e8875d8c r5:847f3c00
r4:847f3c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:847f3c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8875e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8500dc80
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:847f3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f075000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dff69000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8508d78c r4:8508d400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8508d78c r4:84672880
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:847f3c00 r8:846728ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84672880
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84672880 r8:8027ed34 r7:e8851e60 r6:84946d00 r5:847f3c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe8875fb0 to 0xe8875ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8500d380
INFO: task kworker/1:330:3963 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: d4ebb000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:331:3964 blocked for more than 463 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:331 state:D stack:0 pid:3964 tgid:3964 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:ea9b9d84 r8:00000002 r7:60000013 r6:ea9b9d8c r5:847f2400
r4:847f2400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:847f2400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9b9e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8500d700
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:847f2400 r7:00000000 r6:83018200 r5:00001000 r4:7f069000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd67000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8508cb8c r4:8508c800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8508cb8c r4:84672900
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:847f2400 r8:8467292c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84672900
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84672900 r8:8027ed34 r7:e8875e60 r6:84946d80 r5:847f2400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea9b9fb0 to 0xea9b9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8500d380
INFO: task kworker/1:331:3964 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: d521c000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:332:3967 blocked for more than 463 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:332 state:D stack:0 pid:3967 tgid:3967 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e8835d84 r8:00000002 r7:60000113 r6:e8835d8c r5:847f4800
r4:847f4800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:847f4800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8835e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8500d900
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:847f4800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfdc1000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8508cf8c r4:8508cc00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8508cf8c r4:84672980
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:847f4800 r8:846729ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84672980
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84672980 r8:8027ed34 r7:e8875e60 r6:84946e00 r5:847f4800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe8835fb0 to 0xe8835ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8500d640
INFO: task kworker/1:332:3967 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: d54aa000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:97:3968 blocked for more than 463 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:97 state:D stack:0 pid:3968 tgid:3968 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:ea9bdd84 r8:00000002 r7:60000113 r6:ea9bdd8c r5:847f5400
r4:847f5400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:847f5400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9bde08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8465a300
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:847f5400 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfde9000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84adfb8c r4:84adf800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84adfb8c r4:84946e80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:847f5400 r8:84946eac r7:82804d40 r6:dddced40 r5:dddced60
r4:84946e80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84946e80 r8:8027ed34 r7:e0391e60 r6:84946f00 r5:847f5400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea9bdfb0 to 0xea9bdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a32600
INFO: task kworker/0:97:3968 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: d58c5000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:333:3970 blocked for more than 463 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:333 state:D stack:0 pid:3970 tgid:3970 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:ea9c1d84 r8:00000002 r7:60000013 r6:ea9c1d8c r5:847f6000
r4:847f6000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:847f6000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9c1e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8500dac0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:847f6000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dff25000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8508d38c r4:8508d000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8508d38c r4:84672a00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:847f6000 r8:84672a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84672a00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84672a00 r8:8027ed34 r7:e8875e60 r6:84946f80 r5:847f6000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea9c1fb0 to 0xea9c1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8500d600
INFO: task kworker/1:333:3970 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: d5ada000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
r4:847f6c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:847f6c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8869e08
r4:00000000
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: d5ada000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:ea955d84 r8:00000002 r7:60000113 r6:ea955d8c r5:847f3000
r4:847f3000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:847f3000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea955e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8465a7c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:847f3000 r7:00000000 r6:83018000 r5:00001000 r4:7f077000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dff8f000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:83edcf8c r4:83edcc00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:83edcf8c r4:85007000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:847f3000 r8:8500702c r7:82804d40 r6:dddced40 r5:dddced60
r4:85007000
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85007000 r8:8027ed34 r7:e0391e60 r6:85007080 r5:847f3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea955fb0 to 0xea955ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8465a280
INFO: task kworker/0:99:3975 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: d614d000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
r4:84930000
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9cde08
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8500dd80
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dffb3000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8508db8c r4:8508d800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8508db8c r4:84672a80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84930000 r8:84672aac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84672a80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84672a80 r8:8027ed34 r7:e8875e60 r6:85007100 r5:84930000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea9cdfb0 to 0xea9cdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8500db00
INFO: task kworker/1:334:3977 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: d63d1000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:100:3980 blocked for more than 463 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:100 state:D stack:0 pid:3980 tgid:3980 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:ea9d5d84 r8:00000002 r7:60000113 r6:ea9d5d8c r5:84932400
r4:84932400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84932400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9d5e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85153600
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84932400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ea901000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:83edcb8c r4:83edc800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:83edcb8c r4:85007180
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84932400 r8:850071ac r7:82804d40 r6:dddced40 r5:dddced60
r4:85007180
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85007180 r8:8027ed34 r7:e0391e60 r6:85007200 r5:84932400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea9d5fb0 to 0xea9d5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8465a740
INFO: task kworker/0:100:3980 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: d6761000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d60: 80010013 ffffffff
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:335:3981 blocked for more than 463 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:335 state:D stack:0 pid:3981 tgid:3981 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:ea9d9d84 r8:00000002 r7:60000113 r6:ea9d9d8c r5:84933000
r4:84933000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84933000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9d9e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r10:00000000 r9:84672b00 r8:8027ed34 r7:ea9cde60 r6:85007280 r5:84933000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Exception stack(0xe0361d20 to 0xe0361d68)
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:84671280
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9c5e08
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r4:00000001
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:00000000
r4:82abf1e4
r4:00000000
r5:8577c38c r4:8577c000
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:337:3985 blocked for more than 463 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:337 state:D stack:0 pid:3985 tgid:3985 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:ea9d1d84 r8:00000002 r7:60000113 r6:ea9d1d8c r5:85065400
r4:85065400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85065400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9d1e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85002100
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85065400 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0001000
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r4:00000001
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r5:8577c38c r4:8577c000
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:338:3986 blocked for more than 463 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:338 state:D stack:0 pid:3986 tgid:3986 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:ea9c9d84 r8:00000002 r7:60000113 r6:ea9c9d8c r5:85066000
r4:85066000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85066000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9c9e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84149ac0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85066000 r7:00000000 r6:83018200 r5:00001000 r4:7f081000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e002b000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8508eb8c r4:8508e800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:61c88647 r9:85066000 r8:84672dac r7:82804d40 r6:ddde2d40 r5:ddde2d60
9fa0: 00000000 00000000 00000000 00000000
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
1d60: 80010013 ffffffff
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:339:3989 blocked for more than 463 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:339 state:D stack:0 pid:3989 tgid:3989 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:ea9e1d84 r8:00000002 r7:60000013 r6:ea9e1d8c r5:8476e000
r4:8476e000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9e1e08
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
r9:83018205 r8:8476e000 r7:00000000 r6:83018200 r5:00001000 r4:7f085000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
1fa0: 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
r4:00000000
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:340:3991 blocked for more than 463 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:340 state:D stack:0 pid:3991 tgid:3991 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:ea9e9d84 r8:00000002 r7:60000013 r6:ea9e9d8c r5:840b1800
r4:840b1800
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9e9e08
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8509c140
r5:00001000 r4:e0057000
r7:ddde2d40 r6:83018200 r5:8508ef8c r4:84672f80
r4:84672f80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84672f80 r8:8027ed34 r7:ea9e1e60 r6:8509f000 r5:840b1800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea9e9fb0 to 0xea9e9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8509c080
INFO: task kworker/1:340:3991 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: d85e9000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:341:3993 blocked for more than 464 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r4:00000000
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8509c440
r7:ddde2d40 r6:83018200 r5:8508f78c r4:8509f080
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84bf8000 r8:8509f0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8509f080
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8509f080 r8:8027ed34 r7:ea9e1e60 r6:8509f100 r5:84bf8000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea9edfb0 to 0xea9edff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8509c180
INFO: task kworker/1:341:3993 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: d9638000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:342:3995 blocked for more than 464 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:342 state:D stack:0 pid:3995 tgid:3995 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:ea9f1d84 r8:00000002 r7:60000113 r6:ea9f1d8c r5:84bf8c00
r4:84bf8c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84bf8c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9f1e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8509c580
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84bf8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f00d000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:df975000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8508fb8c r4:8508f800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8508fb8c r4:8509f180
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84bf8c00 r8:8509f1ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8509f180
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8509f180 r8:8027ed34 r7:ea9ede60 r6:8509f200 r5:84bf8c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea9f1fb0 to 0xea9f1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8509c4c0
INFO: task kworker/1:342:3995 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: d9638000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:343:3996 blocked for more than 464 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:343 state:D stack:0 pid:3996 tgid:3996 ppid:2 task_flags:0x4208060 flags:0x00000000
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:344:3999 blocked for more than 464 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:344 state:D stack:0 pid:3999 tgid:3999 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e06d5d84 r8:00000002 r7:60000113 r6:e06d5d8c r5:84bfa400
r4:84bfa400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84bfa400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06d5e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8509c7c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84bfa400 r7:00000000 r6:83018200 r5:00001000 r4:7f029000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:df9df000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8508ff8c r4:8508fc00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8508ff8c r4:8509f380
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84bfa400 r8:8509f3ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8509f380
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8509f380 r8:8027ed34 r7:ea9f5e60 r6:8509f400 r5:84bfa400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe06d5fb0 to 0xe06d5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8509c640
INFO: task kworker/1:344:3999 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: db0f2000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:345:4002 blocked for more than 464 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:345 state:D stack:0 pid:4002 tgid:4002 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:ea965d84 r8:00000002 r7:60000113 r6:ea965d8c r5:84bfb000
r4:84bfb000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84bfb000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea965e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8509ca40
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84bfb000 r8:8509f4ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8509f480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8509f480 r8:8027ed34 r7:ea9f5e60 r6:8509f500 r5:84bfb000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea965fb0 to 0xea965ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8509c780
INFO: task kworker/1:345:4002 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: dced7000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
r4:00000000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
INFO: task kworker/1:346:4003 blocked for more than 464 seconds.
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:ea971d84 r8:00000002 r7:60000113 r6:ea971d8c r5:84bfbc00
r4:84bfbc00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84bfbc00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea971e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8509cc00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84bfbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc83000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85094b8c r4:85094800
r10:61c88647 r9:84bfbc00 r8:8509f5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
r5:80010013 r4:80239bd0
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:347:4005 blocked for more than 464 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:347 state:D stack:0 pid:4005 tgid:4005 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:ea999d84 r8:00000002 r7:60000013 r6:ea999d8c r5:84bfc800
r4:84bfc800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84bfc800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea999e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8509cfc0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84bfc800 r7:00000000 r6:83018200 r5:00001000 r4:7f033000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfe09000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8509538c r4:85095000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8509538c r4:8509f700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84bfc800 r8:8509f72c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8509f700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8509f700 r8:8027ed34 r7:ea971e60 r6:8509f780 r5:84bfc800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea999fb0 to 0xea999ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: dd23f000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8509ca80
INFO: task kworker/1:348:4006 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: dd58a000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:349:4008 blocked for more than 464 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:349 state:D stack:0 pid:4008 tgid:4008 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:ea9f9d84 r8:00000002 r7:60000113 r6:ea9f9d8c r5:84bfe000
r4:84bfe000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84bfe000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9f9e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850e03c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84bfe000 r7:00000000 r6:83018200 r5:00001000 r4:7f039000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dff01000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85095f8c r4:85095c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85095f8c r4:8509f880
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84bfe000 r8:8509f8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8509f880
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8509f880 r8:8027ed34 r7:ea999e60 r6:8509f900 r5:84bfe000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea9f9fb0 to 0xea9f9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8509cf00
INFO: task kworker/1:349:4008 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: dde41000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:350:4013 blocked for more than 464 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:350 state:D stack:0 pid:4013 tgid:4013 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaa05d84 r8:00000002 r7:60000113 r6:eaa05d8c r5:850a0000
r4:850a0000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:850a0000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa05e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850e0040
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:850a0000 r7:00000000 r6:83018200 r5:00001000 r4:7f035000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfe49000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8509578c r4:85095400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8509578c r4:8509f980
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:850a0000 r8:8509f9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8509f980
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8509f980 r8:8027ed34 r7:ea9f9e60 r6:8509fa00 r5:850a0000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa05fb0 to 0xeaa05ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:850e0100
INFO: task kworker/1:350:4013 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: dde41000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8577c78c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:353:4017 blocked for more than 464 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:353 state:D stack:0 pid:4017 tgid:4017 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:ea9fdd84 r8:00000002 r7:60000013 r6:ea9fdd8c r5:850a2400
r4:850a2400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:850a2400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9fde08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850e07c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:850a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e03cf000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8509678c r4:85096400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8509678c r4:8509fc80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:850a2400 r8:8509fcac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8509fc80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8509fc80 r8:8027ed34 r7:eaa01e60 r6:8509fd00 r5:850a2400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea9fdfb0 to 0xea9fdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:850e0500
INFO: task kworker/1:353:4017 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: 84a45000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa0de08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850e0ac0
r5:00001000 r4:e0409000
r7:ddde2d40 r6:83018200 r5:85096f8c r4:8509fd80
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:850e0640
INFO: task kworker/1:354:4019 is blocked on a mutex likely owned by task kworker/0:51:3517.
r4:00000000
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:355:4021 blocked for more than 465 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:355 state:D stack:0 pid:4021 tgid:4021 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaa11d84 r8:00000002 r7:60000113 r6:eaa11d8c r5:850a3c00
r4:850a3c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:850a3c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa11e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850e0900
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:850a3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r10:61c88647 r9:850a3c00 r8:8509feac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8509fe80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
5d60: 80000013 ffffffff
r4:dfe15dc0
r4:00000000
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:356:4023 blocked for more than 465 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:356 state:D stack:0 pid:4023 tgid:4023 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaa15d84 r8:00000002 r7:60000113 r6:eaa15d8c r5:850a4800
r4:850a4800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:850a4800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa15e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
r9:83018205 r8:850a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f043000
r10:61c88647 r9:850a4800 r8:8509ffac r7:82804d40 r6:ddde2d40 r5:ddde2d60
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Call trace:
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
r4:00000000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:357:4025 blocked for more than 465 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:357 state:D stack:0 pid:4025 tgid:4025 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaa19d84 r8:00000002 r7:60000113 r6:eaa19d8c r5:850a5400
r4:850a5400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:850a5400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa19e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850e0e40
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:850a5400 r7:00000000 r6:83018200 r5:00001000 r4:7f045000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0443000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8509778c r4:85097400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8509778c r4:850ee080
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:850a5400 r8:850ee0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:850ee080
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:850ee080 r8:8027ed34 r7:eaa15e60 r6:850ee100 r5:850a5400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa19fb0 to 0xeaa19ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:850e0b40
INFO: task kworker/1:357:4025 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: 87d92000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
5d60: 80000013 ffffffff
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:359:4029 blocked for more than 465 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:359 state:D stack:0 pid:4029 tgid:4029 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaa21d84 r8:00000002 r7:60000113 r6:eaa21d8c r5:850a6c00
r4:850a6c00
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r4:00000000
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r5:00001000 r4:e04b1000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8510838c r4:85108000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8510838c r4:850ee280
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:850a6c00 r8:850ee2ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:850ee280
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:850ee280 r8:8027ed34 r7:eaa1de60 r6:850ee300 r5:850a6c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa21fb0 to 0xeaa21ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:850e0d40
INFO: task kworker/1:359:4029 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: 884c4000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
r5:80000013 r4:80239bd0
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r5:00001000 r4:dfa81000
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
r4:00000001
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Not tainted 6.16.0-rc2-syzkaller #0
r10:829185c4 r9:eaa25d84 r8:00000002 r7:60000113 r6:eaa25d8c r5:850a8000
r4:850a8000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:850a8000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa25e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a32640
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:850a8000 r7:00000000 r6:83018200 r5:00001000 r4:7f049000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0490000
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r10:00000000 r9:850ee380 r8:8027ed34 r7:eaa21e60 r6:850ee400 r5:850a8000
Exception stack(0xeaa25fb0 to 0xeaa25ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a32780
INFO: task kworker/1:360:4031 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: 88aa9000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Not tainted 6.16.0-rc2-syzkaller #0
r10:829185c4 r9:eaa2dd84 r8:00000002 r7:60000113 r6:eaa2dd8c r5:850a8c00
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa2de08
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8510878c r4:85108400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8510878c r4:850ee480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:850a8c00 r8:850ee4ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:850ee480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:850ee480 r8:8027ed34 r7:eaa21e60 r6:850ee500 r5:850a8c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa2dfb0 to 0xeaa2dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8509ce80
INFO: task kworker/1:361:4032 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: 88e3d000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
r5:84ac8b8c r4:84ac8800
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
task:kworker/1:362 state:D stack:0 pid:4035 tgid:4035 ppid:2 task_flags:0x4208060 flags:0x00000000
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa29e08
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
r5:00001000 r4:e0565000
r7:ddde2d40 r6:83018200 r5:85108f8c r4:850ee580
r10:00000000 r9:850ee580 r8:8027ed34 r7:eaa2de60 r6:850ee600 r5:850a9800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa29fb0 to 0xeaa29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:850f9040
INFO: task kworker/1:362:4035 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: 8903a000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r4:00000000
r5:00001000 r4:dfa81000
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:364:4039 blocked for more than 465 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:364 state:D stack:0 pid:4039 tgid:4039 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaa39d84 r8:00000002 r7:60000113 r6:eaa39d8c r5:850ab000
r4:850ab000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:850ab000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa39e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f92c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:850ab000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e057b000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8510938c r4:85109000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: 8be4a000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:365:4041 blocked for more than 465 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:365 state:D stack:0 pid:4041 tgid:4041 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
r7:ddde2d40 r6:83018200 r5:85109b8c r4:850ee800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:850abc00 r8:850ee82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:850ee800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:850ee800 r8:8027ed34 r7:eaa39e60 r6:850ee900 r5:850abc00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa3dfb0 to 0xeaa3dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:850f9440
INFO: task kworker/1:365:4041 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: 8be4a000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:367:4044 blocked for more than 465 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:367 state:D stack:0 pid:4044 tgid:4044 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaa45d84 r8:00000002 r7:60000113 r6:eaa45d8c r5:850ae000
r4:850ae000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:850ae000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa45e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f9bc0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:850ae000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e05dd000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85109f8c r4:85109c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85109f8c r4:850eea80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:850ae000 r8:850eeaac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:850eea80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:850eea80 r8:8027ed34 r7:eaa3de60 r6:850eeb00 r5:850ae000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa45fb0 to 0xeaa45ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:850f9900
INFO: task kworker/1:367:4044 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: 8be4a000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:368:4048 blocked for more than 465 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:368 state:D stack:0 pid:4048 tgid:4048 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaa55d84 r8:00000002 r7:60000013 r6:eaa55d8c r5:84936000
r4:84936000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84936000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa55e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f9d00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84936000 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0651000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8510a38c r4:8510a000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8510a38c r4:850eeb80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84936000 r8:850eebac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:850eeb80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:850eeb80 r8:8027ed34 r7:eaa45e60 r6:85007300 r5:84936000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa55fb0 to 0xeaa55ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:850f9a40
INFO: task kworker/1:368:4048 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:dfe15dc0
r4:00000000
r5:00001000 r4:dfa81000
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:369:4049 blocked for more than 465 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:369 state:D stack:0 pid:4049 tgid:4049 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaa41d84 r8:00000002 r7:60000013 r6:eaa41d8c r5:850aec00
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa41e08
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r4:850eec00
Exception stack(0xeaa41fb0 to 0xeaa41ff8)
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: 8be4a000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r4:84b3cc00
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
INFO: task kworker/1:370:4050 blocked for more than 465 seconds.
r4:850ac800
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa49e08
r4:00000000
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r10:00000000 r9:850eed00 r8:8027ed34 r7:eaa41e60 r6:850eed80 r5:850ac800
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: 8c16b000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:371:4053 blocked for more than 465 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:371 state:D stack:0 pid:4053 tgid:4053 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaa51d84 r8:00000002 r7:60000113 r6:eaa51d8c r5:850b0c00
r4:850b0c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:850b0c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:00000000 r9:850eee00 r8:8027ed34 r7:eaa41e60 r6:850eee80 r5:850b0c00
Call trace:
r4:82abf1e4
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
r4:00000001
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa5de08
r5:00001000 r4:e0709000
r5:8510af8c r4:8510ac00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8510af8c r4:850eef00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84935400 r8:850eef2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:850eef00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:850eef00 r8:8027ed34 r7:eaa51e60 r6:85007380 r5:84935400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa5dfb0 to 0xeaa5dff8)
dfa0: 00000000 00000000 00000000 00000000
Call trace:
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa69e08
r9:83018205 r8:84934800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:374:4060 blocked for more than 466 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:374 state:D stack:0 pid:4060 tgid:4060 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaa71d84 r8:00000002 r7:60000013 r6:eaa71d8c r5:84936c00
r4:84936c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa71e08
r4:00000000
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r5:00001000 r4:e8865000
r7:ddde2d40 r6:83018200 r5:85110b8c r4:85144000
r10:00000000 r9:85144000 r8:8027ed34 r7:eaa69e60 r6:85007480 r5:84936c00
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Call trace:
r4:00000000
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:375:4061 blocked for more than 466 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:375 state:D stack:0 pid:4061 tgid:4061 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaa75d84 r8:00000002 r7:60000113 r6:eaa75d8c r5:84930c00
r4:84930c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84930c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa75e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85147640
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84930c00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e47b1000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8510bb8c r4:8510b800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8510bb8c r4:85144080
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84930c00 r8:851440ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85144080
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85144080 r8:8027ed34 r7:eaa71e60 r6:85007500 r5:84930c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa75fb0 to 0xeaa75ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85147300
INFO: task kworker/1:375:4061 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: 8e3b2000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:376:4063 blocked for more than 466 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:376 state:D stack:0 pid:4063 tgid:4063 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaa7dd84 r8:00000002 r7:60000113 r6:eaa7dd8c r5:84bfec00
r4:84bfec00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84bfec00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa7de08
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
r9:83018205 r8:84bfec00 r7:00000000 r6:83018200 r5:00001000 r4:7f097000
r7:ddde2d40 r6:83018200 r5:8510bf8c r4:85144100
r10:00000000 r9:85144100 r8:8027ed34 r7:eaa71e60 r6:85007580 r5:84bfec00
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
Call trace:
Exception stack(0xdfe15d20 to 0xdfe15d68)
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:377:4065 blocked for more than 466 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:377 state:D stack:0 pid:4065 tgid:4065 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaa85d84 r8:00000002 r7:60000113 r6:eaa85d8c r5:84933c00
r4:84933c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84933c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa85e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85147880
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84933c00 r7:00000000 r6:83018200 r5:00001000 r4:7f099000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e8801000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8511038c r4:85110000
r4:85144180
r4:00000001
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:378:4067 blocked for more than 466 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:378 state:D stack:0 pid:4067 tgid:4067 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaa8dd84 r8:00000002 r7:60000113 r6:eaa8dd8c r5:84931800
r4:84931800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84931800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa8de08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851479c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84931800 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e8831000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8511078c r4:85110400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8511078c r4:85144200
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84931800 r8:8514422c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85144200
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85144200 r8:8027ed34 r7:eaa71e60 r6:85007680 r5:84931800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa8dfb0 to 0xeaa8dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85147700
INFO: task kworker/1:378:4067 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: 90729000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
r4:00000001
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Not tainted 6.16.0-rc2-syzkaller #0
r10:829185c4 r9:eaa91d84 r8:00000002 r7:60000113 r6:eaa91d8c r5:84938000
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa91e08
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r10:00000000 r9:85144280 r8:8027ed34 r7:eaa71e60 r6:85007700 r5:84938000
Exception stack(0xeaa91fb0 to 0xeaa91ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85147940
INFO: task kworker/1:379:4070 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: 90b50000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:380:4071 blocked for more than 466 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:380 state:D stack:0 pid:4071 tgid:4071 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaa95d84 r8:00000002 r7:60000113 r6:eaa95d8c r5:84938c00
r4:84938c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84938c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa95e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85147c80
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84938c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ea88b000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85110f8c r4:85110c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85110f8c r4:85144300
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84938c00 r8:8514432c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85144300
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85144300 r8:8027ed34 r7:eaa91e60 r6:85007780 r5:84938c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa95fb0 to 0xeaa95ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85147bc0
INFO: task kworker/1:380:4071 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: 90d83000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:381:4073 blocked for more than 466 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:381 state:D stack:0 pid:4073 tgid:4073 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaa99d84 r8:00000002 r7:60000113 r6:eaa99d8c r5:84939800
r4:84939800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84939800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa99e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85147f80
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84939800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ea923000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8511178c r4:85111400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8511178c r4:85144380
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84939800 r8:851443ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85144380
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85144380 r8:8027ed34 r7:eaa91e60 r6:85007800 r5:84939800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa99fb0 to 0xeaa99ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85147a80
INFO: task kworker/1:381:4073 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: 914bb000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:382:4075 blocked for more than 466 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:382 state:D stack:0 pid:4075 tgid:4075 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaa9dd84 r8:00000002 r7:60000013 r6:eaa9dd8c r5:8493a400
r4:8493a400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8493a400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa9de08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850e88c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8493a400 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ea94d000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85111b8c r4:85111800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85111b8c r4:85144400
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8493a400 r8:8514442c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85144400
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85144400 r8:8027ed34 r7:eaa99e60 r6:85007880 r5:8493a400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa9dfb0 to 0xeaa9dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85147b00
INFO: task kworker/1:382:4075 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: 917bb000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:101:4077 blocked for more than 466 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:101 state:D stack:0 pid:4077 tgid:4077 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaa89d84 r8:00000002 r7:60000113 r6:eaa89d8c r5:8493b000
r4:8493b000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8493b000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa89e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85153780
r5:83edc78c r4:83edc400
r10:61c88647 r9:8493b000 r8:8500792c r7:82804d40 r6:dddced40 r5:dddced60
r4:00000001
9fa0: 00000000 00000000 00000000 00000000
r4:85153480
INFO: task kworker/0:101:4077 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: 91aed000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r5:00001000 r4:dfa81000
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
INFO: task kworker/1:383:4080 blocked for more than 466 seconds.
r4:8493bc00
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa61e08
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
r5:00001000 r4:dfb79000
r5:8511238c r4:85112000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8511238c r4:85144480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8493bc00 r8:851444ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85144480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85144480 r8:8027ed34 r7:eaa9de60 r6:85007a00 r5:8493bc00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa61fb0 to 0xeaa61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:850e8e40
INFO: task kworker/1:383:4080 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: 91c6d000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:384:4082 blocked for more than 466 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:384 state:D stack:0 pid:4082 tgid:4082 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:ea975d84 r8:00000002 r7:60000113 r6:ea975d8c r5:8493c800
r4:8493c800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8493c800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea975e08
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r5:8511278c r4:85112400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8511278c r4:85144500
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8493c800 r8:8514452c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85144500
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85144500 r8:8027ed34 r7:eaa61e60 r6:85007a80 r5:8493c800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea975fb0 to 0xea975ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85147ec0
INFO: task kworker/1:384:4082 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
task:kworker/0:102 state:D stack:0 pid:4085 tgid:4085 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaa59d84 r8:00000002 r7:60000113 r6:eaa59d8c r5:8493d400
r4:8493d400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8493d400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa59e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85165bc0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:8493d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ea9b3000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:83edd78c r4:83edd400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:83edd78c r4:85007b00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8493d400 r8:85007b2c r7:82804d40 r6:dddced40 r5:dddced60
r4:85007b00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85007b00 r8:8027ed34 r7:e0391e60 r6:85007b80 r5:8493d400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa59fb0 to 0xeaa59ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85153700
INFO: task kworker/0:102:4085 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: 92097000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaa5e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85148600
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8493e000 r7:00000000 r6:83018200 r5:00001000 r4:7f065000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc53000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85112f8c r4:85112c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85112f8c r4:85144580
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8493e000 r8:851445ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85144580
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85144580 r8:8027ed34 r7:ea975e60 r6:85007c00 r5:8493e000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaaa5fb0 to 0xeaaa5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85148280
INFO: task kworker/1:385:4087 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
task:kworker/1:386 state:D stack:0 pid:4088 tgid:4088 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaaa9d84 r8:00000002 r7:60000113 r6:eaaa9d8c r5:8493ec00
r4:8493ec00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8493ec00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaa9e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85148500
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8493ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f063000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc11000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85112b8c r4:85112800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85112b8c r4:85144600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8493ec00 r8:8514462c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85144600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85144600 r8:8027ed34 r7:eaaa5e60 r6:85007c80 r5:8493ec00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaaa9fb0 to 0xeaaa9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85148280
INFO: task kworker/1:386:4088 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: 93e67000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
r4:00000000
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
r10:829185c4 r9:eaab5d84 r8:00000002 r7:60000113 r6:eaab5d8c r5:84770000
r4:84770000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84770000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaab5e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851488c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84770000 r7:00000000 r6:83018200 r5:00001000 r4:7f069000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd9f000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8511378c r4:85113400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8511378c r4:85144680
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84770000 r8:851446ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85144680
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85144680 r8:8027ed34 r7:eaaa5e60 r6:85007d00 r5:84770000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaab5fb0 to 0xeaab5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85148400
INFO: task kworker/1:387:4091 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
r4:00000000
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:388:4092 blocked for more than 466 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
Workqueue: events bpf_prog_free_deferred
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea985e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
r4:00000000
r5:00001000 r4:dfd55000
r5:8511338c r4:85113000
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Call trace:
Exception stack(0xdfe15d20 to 0xdfe15d68)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r5:00001000 r4:dfa81000
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:389:4095 blocked for more than 466 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:389 state:D stack:0 pid:4095 tgid:4095 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaab9d84 r8:00000002 r7:60000113 r6:eaab9d8c r5:850b3000
r4:850b3000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:850b3000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaab9e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85148a00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:850b3000 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfdd5000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85113b8c r4:85113800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85113b8c r4:85144800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r4:85144800
r4:00000001
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:390:4098 blocked for more than 466 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:390 state:D stack:0 pid:4098 tgid:4098 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaac9d84 r8:00000002 r7:60000013 r6:eaac9d8c r5:84772400
r4:84772400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84772400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaac9e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85148b40
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84772400 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfe03000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85113f8c r4:85113c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85113f8c r4:85144900
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84772400 r8:8514492c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85144900
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85144900 r8:8027ed34 r7:eaab9e60 r6:85007d80 r5:84772400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaac9fb0 to 0xeaac9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85148880
INFO: task kworker/1:390:4098 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: 949e0000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:391:4099 blocked for more than 466 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:391 state:D stack:0 pid:4099 tgid:4099 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaacdd84 r8:00000002 r7:60000013 r6:eaacdd8c r5:84771800
r4:84771800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84771800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaacde08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85148f80
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84771800 r7:00000000 r6:83018200 r5:00001000 r4:7f073000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dffa5000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85114b8c r4:85114800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85114b8c r4:85144980
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84771800 r8:851449ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85144980
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85144980 r8:8027ed34 r7:eaac9e60 r6:85007e00 r5:84771800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaacdfb0 to 0xeaacdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:851489c0
INFO: task kworker/1:391:4099 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: 949e0000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:392:4100 blocked for more than 467 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:392 state:D stack:0 pid:4100 tgid:4100 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaabdd84 r8:00000002 r7:60000113 r6:eaabdd8c r5:850b3c00
r4:850b3c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:850b3c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaabde08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85148c80
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:850b3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dff4b000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8511438c r4:85114000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8511438c r4:85144a00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:850b3c00 r8:85144a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85144a00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85144a00 r8:8027ed34 r7:eaacde60 r6:85144a80 r5:850b3c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaabdfb0 to 0xeaabdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:851489c0
INFO: task kworker/1:392:4100 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: 9779c000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:393:4103 blocked for more than 467 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:393 state:D stack:0 pid:4103 tgid:4103 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaac5d84 r8:00000002 r7:60000113 r6:eaac5d8c r5:850b4800
r4:850b4800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:850b4800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaac5e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85148e00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:850b4800 r7:00000000 r6:83018200 r5:00001000 r4:7f071000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dff81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8511478c r4:85114400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8511478c r4:85144b00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:850b4800 r8:85144b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85144b00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85144b00 r8:8027ed34 r7:eaacde60 r6:85144b80 r5:850b4800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:dfe15dc0
r4:00000000
r5:00001000 r4:dfa81000
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:394:4105 blocked for more than 467 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:394 state:D stack:0 pid:4105 tgid:4105 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaad1d84 r8:00000002 r7:60000013 r6:eaad1d8c r5:850b5400
r4:850b5400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:850b5400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaad1e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8515b380
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:850b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f077000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfff1000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8511538c r4:85115000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8511538c r4:85144c00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:850b5400 r8:85144c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85144c00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85144c00 r8:8027ed34 r7:eaacde60 r6:85144c80 r5:850b5400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaad1fb0 to 0xeaad1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8515b000
INFO: task kworker/1:394:4105 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: 9900a000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:395:4106 blocked for more than 467 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:395 state:D stack:0 pid:4106 tgid:4106 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaaa1d84 r8:00000002 r7:60000113 r6:eaaa1d8c r5:850b6000
r4:850b6000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:850b6000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaa1e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8515b040
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:850b6000 r7:00000000 r6:83018200 r5:00001000 r4:7f075000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dffd1000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85114f8c r4:85114c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85114f8c r4:85144d00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:850b6000 r8:85144d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85144d00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85144d00 r8:8027ed34 r7:eaad1e60 r6:85144d80 r5:850b6000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaaa1fb0 to 0xeaaa1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8515b000
INFO: task kworker/1:395:4106 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: 9900a000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:396:4109 blocked for more than 467 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:396 state:D stack:0 pid:4109 tgid:4109 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaad9d84 r8:00000002 r7:60000113 r6:eaad9d8c r5:850b6c00
r4:850b6c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:850b6c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaad9e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8515b4c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:850b6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e001f000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8511578c r4:85115400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8511578c r4:85144e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:850b6c00 r8:85144e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85144e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85144e00 r8:8027ed34 r7:eaad1e60 r6:85144e80 r5:850b6c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaad9fb0 to 0xeaad9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8515b200
INFO: task kworker/1:396:4109 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: 996e8000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:397:4111 blocked for more than 467 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:397 state:D stack:0 pid:4111 tgid:4111 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaae1d84 r8:00000002 r7:60000113 r6:eaae1d8c r5:850b0000
r4:850b0000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:850b0000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaae1e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8515b700
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:850b0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e005b000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85115b8c r4:85115800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85115b8c r4:85144f00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:850b0000 r8:85144f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85144f00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85144f00 r8:8027ed34 r7:eaad9e60 r6:85144f80 r5:850b0000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaae1fb0 to 0xeaae1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8515b340
INFO: task kworker/1:397:4111 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: 9a6a7000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:398:4112 blocked for more than 467 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:398 state:D stack:0 pid:4112 tgid:4112 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaaddd84 r8:00000002 r7:60000113 r6:eaaddd8c r5:850b1800
r4:850b1800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:850b1800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaadde08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:399:4115 blocked for more than 467 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:399 state:D stack:0 pid:4115 tgid:4115 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaaf1d84 r8:00000002 r7:60000013 r6:eaaf1d8c r5:84773000
r4:84773000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84773000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaf1e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8515b940
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84773000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0525000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8511638c r4:85116000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8511638c r4:85160100
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84773000 r8:8516012c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85160100
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85160100 r8:8027ed34 r7:eaadde60 r6:85007e80 r5:84773000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaaf1fb0 to 0xeaaf1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8515b6c0
INFO: task kworker/1:399:4115 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: 9b471000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:400:4117 blocked for more than 467 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:400 state:D stack:0 pid:4117 tgid:4117 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaaf9d84 r8:00000002 r7:60000013 r6:eaaf9d8c r5:84774800
r4:84774800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84774800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaf9e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8515bd80
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84774800 r7:00000000 r6:83018200 r5:00001000 r4:7f085000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ea989000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85116f8c r4:85116c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85116f8c r4:85160180
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84774800 r8:851601ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85160180
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85160180 r8:8027ed34 r7:eaaf1e60 r6:85007f00 r5:84774800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaaf9fb0 to 0xeaaf9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8515b740
INFO: task kworker/1:400:4117 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: 9b7c4000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:401:4119 blocked for more than 467 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:401 state:D stack:0 pid:4119 tgid:4119 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eab01d84 r8:00000002 r7:60000013 r6:eab01d8c r5:84770c00
r4:84770c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84770c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab01e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8515ba80
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84770c00 r7:00000000 r6:83018200 r5:00001000 r4:7f081000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ea945000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8511678c r4:85116400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8511678c r4:85160200
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84770c00 r8:8516022c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85160200
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85160200 r8:8027ed34 r7:eaaf9e60 r6:85007f80 r5:84770c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeab01fb0 to 0xeab01ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8515b9c0
INFO: task kworker/1:401:4119 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: 9bf85000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:402:4121 blocked for more than 467 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:402 state:D stack:0 pid:4121 tgid:4121 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eab05d84 r8:00000002 r7:60000013 r6:eab05d8c r5:84773c00
r4:84773c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84773c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab05e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8515bbc0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84773c00 r7:00000000 r6:83018200 r5:00001000 r4:7f083000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ea969000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85116b8c r4:85116800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85116b8c r4:85160280
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84773c00 r8:851602ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85160280
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85160280 r8:8027ed34 r7:eaaf9e60 r6:85170000 r5:84773c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeab05fb0 to 0xeab05ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8515ba40
INFO: task kworker/1:402:4121 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: 9c3df000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:403:4123 blocked for more than 467 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:403 state:D stack:0 pid:4123 tgid:4123 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eab0dd84 r8:00000002 r7:60000013 r6:eab0dd8c r5:84776c00
r4:84776c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84776c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab0de08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85148d40
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84776c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b1000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eab2f000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85117b8c r4:85117800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85117b8c r4:85160300
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84776c00 r8:8516032c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85160300
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85160300 r8:8027ed34 r7:eaaf9e60 r6:85170080 r5:84776c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeab0dfb0 to 0xeab0dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8515bc00
INFO: task kworker/1:403:4123 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: 9c79a000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:404:4124 blocked for more than 467 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:404 state:D stack:0 pid:4124 tgid:4124 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eab11d84 r8:00000002 r7:60000013 r6:eab11d8c r5:84775400
r4:84775400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84775400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab11e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8515bec0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84775400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ea99f000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8511738c r4:85117000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8511738c r4:85160380
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84775400 r8:851603ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85160380
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85160380 r8:8027ed34 r7:eab0de60 r6:85170100 r5:84775400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeab11fb0 to 0xeab11ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8515bc00
INFO: task kworker/1:404:4124 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
5d60: 80000013 ffffffff
r4:dfe15dc0
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
INFO: task kworker/1:405:4126 blocked for more than 467 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:405 state:D stack:0 pid:4126 tgid:4126 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eab19d84 r8:00000002 r7:60000013 r6:eab19d8c r5:84358c00
r4:84358c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84358c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab19e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a32a80
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84358c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eab1b000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8511778c r4:85117400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8511778c r4:85160400
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84358c00 r8:8516042c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85160400
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85160400 r8:8027ed34 r7:eab0de60 r6:85170180 r5:84358c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeab19fb0 to 0xeab19ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8515bd40
INFO: task kworker/1:405:4126 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: 9cf1c000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:00000000
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
r5:84ac8b8c r4:84ac8800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
Call trace:
r4:84359800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84359800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab15e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85165f80
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84359800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eab43000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84bec78c r4:84bec400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84bec78c r4:85170200
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84359800 r8:8517022c r7:82804d40 r6:dddced40 r5:dddced60
r4:85170200
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85170200 r8:8027ed34 r7:e0391e60 r6:85170280 r5:84359800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeab15fb0 to 0xeab15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85165a40
INFO: task kworker/0:103:4128 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: 9ee33000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:84ac8b8c r4:84ac8800
r4:84b3cc00
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:406:4130 blocked for more than 467 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:406 state:D stack:0 pid:4130 tgid:4130 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaae9d84 r8:00000002 r7:60000013 r6:eaae9d8c r5:850b8c00
r4:850b8c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:850b8c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaae9e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851667c0
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
9fa0: 00000000 00000000 00000000 00000000
r4:00000000
r4:dfe15dc0
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:104:4131 blocked for more than 467 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:104 state:D stack:0 pid:4131 tgid:4131 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaafdd84 r8:00000002 r7:60000113 r6:eaafdd8c r5:8435a400
r4:8435a400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8435a400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaafde08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85165e80
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84bec38c r4:84bec000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84bec38c r4:85170300
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8435a400 r8:8517032c r7:82804d40 r6:dddced40 r5:dddced60
r4:85170300
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85170300 r8:8027ed34 r7:eab15e60 r6:85170380 r5:8435a400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaafdfb0 to 0xeaafdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85165b80
INFO: task kworker/0:104:4131 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r4:00000001
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/1:407 state:D stack:0 pid:4135 tgid:4135 ppid:2 task_flags:0x4208060 flags:0x00000000
r10:829185c4 r9:eab4dd84 r8:00000002 r7:60000113 r6:eab4dd8c r5:850b8000
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab4de08
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851665c0
r9:83018205 r8:850b8000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b9000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eab6b000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85117f8c r4:85117c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85117f8c r4:85160580
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:850b8000 r8:851605ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85160580
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85160580 r8:8027ed34 r7:eaae9e60 r6:85160600 r5:850b8000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeab4dfb0 to 0xeab4dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:850f9f40
INFO: task kworker/1:407:4135 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: 9eec4000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:105:4137 blocked for more than 467 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:105 state:D stack:0 pid:4137 tgid:4137 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eab5dd84 r8:00000002 r7:60000113 r6:eab5dd8c r5:850bb000
r4:850bb000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:850bb000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab5de08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85165680
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:850bb000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b7000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eab53000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84becb8c r4:84bec800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84becb8c r4:85170400
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:850bb000 r8:8517042c r7:82804d40 r6:dddced40 r5:dddced60
r4:85170400
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85170400 r8:8027ed34 r7:eab15e60 r6:85160680 r5:850bb000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeab5dfb0 to 0xeab5dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85165d80
INFO: task kworker/0:105:4137 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:00000000
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:106:4138 blocked for more than 467 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:106 state:D stack:0 pid:4138 tgid:4138 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eab65d84 r8:00000002 r7:60000113 r6:eab65d8c r5:850bbc00
r4:850bbc00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:850bbc00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab65e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8516c980
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:850bbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f035000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0387000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84bed78c r4:84bed400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84bed78c r4:85170480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:850bbc00 r8:851704ac r7:82804d40 r6:dddced40 r5:dddced60
r4:85170480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85170480 r8:8027ed34 r7:eab5de60 r6:85160700 r5:850bbc00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeab65fb0 to 0xeab65ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85165f40
INFO: task kworker/0:106:4138 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: a0ed3000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:107:4140 blocked for more than 467 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:107 state:D stack:0 pid:4140 tgid:4140 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eab69d84 r8:00000002 r7:60000113 r6:eab69d8c r5:850ba400
r4:850ba400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:850ba400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab69e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8516ca80
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:850ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f033000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfe7d000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84bed38c r4:84bed000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84bed38c r4:85170500
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:850ba400 r8:8517052c r7:82804d40 r6:dddced40 r5:dddced60
r4:85170500
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85170500 r8:8027ed34 r7:eab65e60 r6:85170580 r5:850ba400
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:408:4142 blocked for more than 467 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:408 state:D stack:0 pid:4142 tgid:4142 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eab41d84 r8:00000002 r7:60000013 r6:eab41d8c r5:8435bc00
r4:8435bc00
r5:8435bc00 r4:829185c0
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab41e08
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r10:00000000 r9:85160780 r8:8027ed34 r7:eaae9e60 r6:85170600 r5:8435bc00
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r5:00001000 r4:dfa81000
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:409:4145 blocked for more than 468 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:409 state:D stack:0 pid:4145 tgid:4145 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eab8dd84 r8:00000002 r7:60000113 r6:eab8dd8c r5:8435d400
r4:8435d400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8435d400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab8de08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85166cc0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8435d400 r7:00000000 r6:83018200 r5:00001000 r4:7f0c5000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eabbf000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8512178c r4:85121400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8512178c r4:85160800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8435d400 r8:8516082c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85160800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85160800 r8:8027ed34 r7:eaae9e60 r6:85170680 r5:8435d400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeab8dfb0 to 0xeab8dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85166680
INFO: task kworker/1:409:4145 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r4:00000000
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:00000000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:410:4146 blocked for more than 468 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:410 state:D stack:0 pid:4146 tgid:4146 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eab91d84 r8:00000002 r7:60000113 r6:eab91d8c r5:8435c800
r4:8435c800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8435c800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab91e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85166940
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8435c800 r7:00000000 r6:83018200 r5:00001000 r4:7f0bf000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eab93000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85120b8c r4:85120800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85120b8c r4:85160880
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8435c800 r8:851608ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85160880
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85160880 r8:8027ed34 r7:eab8de60 r6:85170700 r5:8435c800
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
5d60: 80000013 ffffffff
r4:00000000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:411:4148 blocked for more than 468 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:411 state:D stack:0 pid:4148 tgid:4148 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r4:00000000
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r4:85160900
Exception stack(0xeaba1fb0 to 0xeaba1ff8)
r4:85166740
Workqueue: events bpf_prog_free_deferred
r4:00000000
r5:80000013 r4:80239bd0
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r5:00001000 r4:dfa81000
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:412:4151 blocked for more than 468 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:412 state:D stack:0 pid:4151 tgid:4151 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eabbdd84 r8:00000002 r7:60000113 r6:eabbdd8c r5:8435e000
r4:8435e000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8435e000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabbde08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85166bc0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8435e000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c3000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eabaf000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8512138c r4:85121000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8512138c r4:85160980
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8435e000 r8:851609ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85160980
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85160980 r8:8027ed34 r7:eab8de60 r6:85170800 r5:8435e000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeabbdfb0 to 0xeabbdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:851668c0
INFO: task kworker/1:412:4151 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: a1ef7000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/1:413 state:D stack:0 pid:4153 tgid:4153 ppid:2 task_flags:0x4208060 flags:0x00000000
r10:829185c4 r9:eabc9d84 r8:00000002 r7:60000113 r6:eabc9d8c r5:8435ec00
r4:8435ec00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8435ec00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabc9e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85166f40
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8435ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c9000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eabd7000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85121f8c r4:85121c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85121f8c r4:85160a00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8435ec00 r8:85160a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85160a00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85160a00 r8:8027ed34 r7:eab8de60 r6:85170880 r5:8435ec00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeabc9fb0 to 0xeabc9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85166a40
INFO: task kworker/1:413:4153 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
r5:80000013 r4:80239bd0
r4:dfe15dc0
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:414:4154 blocked for more than 468 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:414 state:D stack:0 pid:4154 tgid:4154 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eabcdd84 r8:00000002 r7:60000113 r6:eabcdd8c r5:84358000
r4:84358000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84358000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabcde08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85166f00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84358000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c7000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eabcf000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r7:ddde2d40 r6:83018200 r5:85121b8c r4:85160a80
r4:00000001
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
r4:00000000
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:415:4157 blocked for more than 468 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:415 state:D stack:0 pid:4157 tgid:4157 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eabe5d84 r8:00000002 r7:60000113 r6:eabe5d8c r5:84776000
r4:84776000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84776000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabe5e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85165000
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84776000 r7:00000000 r6:83018200 r5:00001000 r4:7f0cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eabf7000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8512278c r4:85122400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
r4:00000000
r5:00001000 r4:dfa81000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:416:4158 blocked for more than 468 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:416 state:D stack:0 pid:4158 tgid:4158 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eabedd84 r8:00000002 r7:60000113 r6:eabedd8c r5:84870000
r4:84870000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84870000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabede08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85166040
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84870000 r7:00000000 r6:83018200 r5:00001000 r4:7f0cb000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eabdf000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8512238c r4:85122000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8512238c r4:85160b80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84870000 r8:85160bac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85160b80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85160b80 r8:8027ed34 r7:eabe5e60 r6:85170a00 r5:84870000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeabedfb0 to 0xeabedff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85166f80
INFO: task kworker/1:416:4158 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: a3211000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:417:4160 blocked for more than 468 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:417 state:D stack:0 pid:4160 tgid:4160 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eabf5d84 r8:00000002 r7:60000013 r6:eabf5d8c r5:84871800
r4:84871800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84871800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabf5e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8509d040
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84871800 r7:00000000 r6:83018200 r5:00001000 r4:7f00d000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:df989000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85122f8c r4:85122c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85122f8c r4:85160c00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84871800 r8:85160c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85160c00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85160c00 r8:8027ed34 r7:eabe5e60 r6:85170a80 r5:84871800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeabf5fb0 to 0xeabf5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85166a40
INFO: task kworker/1:417:4160 is blocked on a mutex likely owned by task kworker/0:51:3517.
Workqueue: events bpf_prog_free_deferred
r4:00000000
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
r4:dfe15dc0
r4:00000000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:84ac8b8c r4:84ac8800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r4:00000001
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
task:kworker/1:418 state:D stack:0 pid:4163 tgid:4163 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eac19d84 r8:00000002 r7:60000113 r6:eac19d8c r5:84870c00
r4:84870c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84870c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac19e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85166e00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84870c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0cf000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eac03000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85122b8c r4:85122800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85122b8c r4:85160c80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84870c00 r8:85160cac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85160c80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85160c80 r8:8027ed34 r7:eabf5e60 r6:85170b00 r5:84870c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac19fb0 to 0xeac19ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85166240
INFO: task kworker/1:418:4163 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: a36a3000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:419:4165 blocked for more than 468 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:419 state:D stack:0 pid:4165 tgid:4165 ppid:2 task_flags:0x4208060 flags:0x00000000
r10:829185c4 r9:eac1dd84 r8:00000002 r7:60000113 r6:eac1dd8c r5:84873c00
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac1de08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8509d8c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84873c00 r7:00000000 r6:83018200 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfe31000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85123f8c r4:85123c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85123f8c r4:85160d00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84873c00 r8:85160d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85160d00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85160d00 r8:8027ed34 r7:eabf5e60 r6:85170b80 r5:84873c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac1dfb0 to 0xeac1dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8509d080
INFO: task kworker/1:419:4165 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: a50c9000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:420:4166 blocked for more than 468 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:420 state:D stack:0 pid:4166 tgid:4166 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eac21d84 r8:00000002 r7:60000013 r6:eac21d8c r5:84873000
r4:84873000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84873000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac21e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8509d340
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84873000 r7:00000000 r6:83018200 r5:00001000 r4:7f029000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa07000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8512338c r4:85123000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8512338c r4:85160d80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:00000000 r9:85160d80 r8:8027ed34 r7:eac1de60 r6:85170c00 r5:84873000
r4:8509d100
Workqueue: events bpf_prog_free_deferred
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
r4:00000000
r5:00001000 r4:dfa81000
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:421:4168 blocked for more than 468 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:421 state:D stack:0 pid:4168 tgid:4168 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eac25d84 r8:00000002 r7:60000113 r6:eac25d8c r5:84874800
r4:84874800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84874800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac25e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8509d480
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84874800 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfaad000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8512378c r4:85123400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8512378c r4:85160e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84874800 r8:85160e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85160e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85160e00 r8:8027ed34 r7:eac1de60 r6:85170c80 r5:84874800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac25fb0 to 0xeac25ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8509d3c0
INFO: task kworker/1:421:4168 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: a5ac1000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
r4:00000001
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:422:4170 blocked for more than 468 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8509d580
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:850be000 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfb3d000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85123b8c r4:85123800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85123b8c r4:85160e80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:850be000 r8:85160eac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85160e80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85160e80 r8:8027ed34 r7:eac1de60 r6:85160f00 r5:850be000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa6dfb0 to 0xeaa6dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8509d4c0
INFO: task kworker/1:422:4170 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: a6caf000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:423:4172 blocked for more than 468 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:423 state:D stack:0 pid:4172 tgid:4172 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eac29d84 r8:00000002 r7:60000113 r6:eac29d8c r5:850bd400
r4:850bd400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:850bd400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac29e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8509dc40
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:850bd400 r7:00000000 r6:83018200 r5:00001000 r4:7f037000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e03c1000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8512438c r4:85124000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8512438c r4:85160f80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:850bd400 r8:85160fac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85160f80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85160f80 r8:8027ed34 r7:eac1de60 r6:84673000 r5:850bd400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac29fb0 to 0xeac29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8509d3c0
INFO: task kworker/1:423:4172 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: a70bd000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:424:4175 blocked for more than 468 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:424 state:D stack:0 pid:4175 tgid:4175 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eac31d84 r8:00000002 r7:60000113 r6:eac31d8c r5:850bc800
r4:850bc800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:850bc800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac31e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8509dd80
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:850bc800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e03e5000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8512478c r4:85124400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8512478c r4:84673080
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:850bc800 r8:846730ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84673080
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84673080 r8:8027ed34 r7:eac29e60 r6:84673100 r5:850bc800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac31fb0 to 0xeac31ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r4:8509d680
INFO: task kworker/1:424:4175 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r4:00000000
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
r5:84bedb8c r4:84bed800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84bedb8c r4:85170d00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84876000 r8:85170d2c r7:82804d40 r6:dddced40 r5:dddced60
r4:85170d00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85170d00 r8:8027ed34 r7:eab65e60 r6:85170d80 r5:84876000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeab2dfb0 to 0xeab2dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8516ca00
INFO: task kworker/0:108:4178 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r10:829185c4 r9:eac2dd84 r8:00000002 r7:60000113 r6:eac2dd8c r5:84876c00
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac2de08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846beb00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84876c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ead0b000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85138b8c r4:85138800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:85138b8c r4:85170e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84876c00 r8:85170e2c r7:82804d40 r6:dddced40 r5:dddced60
r4:85170e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85170e00 r8:8027ed34 r7:eab2de60 r6:85170e80 r5:84876c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac2dfb0 to 0xeac2dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8516ca00
INFO: task kworker/0:109:4179 is blocked on a mutex likely owned by task kworker/0:51:3517.
r4:00000000
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac41e08
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r4:8509dac0
Workqueue: events bpf_prog_free_deferred
r4:82abf1e4
r4:00000000
r5:84ac8b8c r4:84ac8800
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:426:4184 blocked for more than 468 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:426 state:D stack:0 pid:4184 tgid:4184 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eac4dd84 r8:00000002 r7:60000013 r6:eac4dd8c r5:84858000
r4:84858000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84858000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac4de08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a32b00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84858000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e04e1000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85125b8c r4:85125800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85125b8c r4:84673200
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84858000 r8:8467322c r7:82804d40 r6:ddde2d40 r5:ddde2d60
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
r4:00000000
r4:82abf1e4
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:427:4185 blocked for more than 468 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:427 state:D stack:0 pid:4185 tgid:4185 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eac51d84 r8:00000002 r7:60000113 r6:eac51d8c r5:84859800
r4:84859800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84859800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac51e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8509df80
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84859800 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0437000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85124f8c r4:85124c00
r10:61c88647 r9:84859800 r8:846732ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
Exception stack(0xeac51fb0 to 0xeac51ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8509dec0
INFO: task kworker/1:427:4185 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r5:00001000 r4:dfa81000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:428:4188 blocked for more than 468 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:428 state:D stack:0 pid:4188 tgid:4188 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eac5dd84 r8:00000002 r7:60000113 r6:eac5dd8c r5:84858c00
r4:84858c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84858c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac5de08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8509d800
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84858c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e045b000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r10:00000000 r9:84673300 r8:8027ed34 r7:eac4de60 r6:84b46080 r5:84858c00
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
task:kworker/1:429 state:D stack:0 pid:4189 tgid:4189 ppid:2 task_flags:0x4208060 flags:0x00000000
r5:00001000 r4:e0497000
r4:00000001
r4:8509df00
r4:00000000
r4:dfe15dc0
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:430:4192 blocked for more than 468 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:430 state:D stack:0 pid:4192 tgid:4192 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eac69d84 r8:00000002 r7:60000013 r6:eac69d8c r5:8485b000
r4:8485b000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8485b000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac69e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8502c500
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8485b000 r7:00000000 r6:83018200 r5:00001000 r4:7f049000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0585000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8512678c r4:85126400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8512678c r4:84673400
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8485b000 r8:8467342c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84673400
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84673400 r8:8027ed34 r7:eac4de60 r6:84b46180 r5:8485b000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac69fb0 to 0xeac69ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8509d680
INFO: task kworker/1:430:4192 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: aaa76000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r4:00000000
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
INFO: task kworker/1:431:4193 blocked for more than 468 seconds.
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac59e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8502c180
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:850b9800 r7:00000000 r6:83018200 r5:00001000 r4:7f045000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0539000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85125f8c r4:85125c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85125f8c r4:84673480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
Exception stack(0xeac59fb0 to 0xeac59ff8)
r4:00000000
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:84b3cc00
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac6de08
r4:00000000
r10:61c88647 r9:850bec00 r8:846735ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84673580 r8:8027ed34 r7:eac69e60 r6:84673600 r5:850bec00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac6dfb0 to 0xeac6dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8502c000
INFO: task kworker/1:432:4196 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: ab0d1000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac3de08
r4:00000000
r10:61c88647 r9:850c0000 r8:846736ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:00000000
r4:00000000
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac71e08
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85126f8c r4:85126c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85126f8c r4:84673780
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:850c0c00 r8:846737ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84673780
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84673780 r8:8027ed34 r7:eac3de60 r6:84673800 r5:850c0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac71fb0 to 0xeac71ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8502c4c0
INFO: task kworker/1:434:4200 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: ab2b8000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
r4:00000000
r4:84b3cc00
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac79e08
r9:83018205 r8:850c1800 r7:00000000 r6:83018200 r5:00001000 r4:7f053000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
task:kworker/1:436 state:D stack:0 pid:4203 tgid:4203 ppid:2 task_flags:0x4208060 flags:0x00000000
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8502c800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac75fb0 to 0xeac75ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8502c540
INFO: task kworker/1:436:4203 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: ab5a8000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Workqueue: events bpf_prog_free_deferred
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac7de08
r4:00000000
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
r9:83018205 r8:850c3000 r7:00000000 r6:83018200 r5:00001000 r4:7f051000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e06a1000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8512778c r4:85127400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8512778c r4:84673a80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:850c3000 r8:84673aac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84673a80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84673a80 r8:8027ed34 r7:eac79e60 r6:84673b00 r5:850c3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac7dfb0 to 0xeac7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8502cac0
INFO: task kworker/1:437:4206 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: ad80f000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:438:4208 blocked for more than 469 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:438 state:D stack:0 pid:4208 tgid:4208 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eac85d84 r8:00000002 r7:60000113 r6:eac85d8c r5:850c3c00
r4:850c3c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:850c3c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac85e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8509da00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:850c3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f059000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e47cf000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8512c78c r4:8512c400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8512c78c r4:84673b80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:850c3c00 r8:84673bac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84673b80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84673b80 r8:8027ed34 r7:eac79e60 r6:84673c00 r5:850c3c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac85fb0 to 0xeac85ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8502c980
INFO: task kworker/1:438:4208 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: ada08000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:439:4210 blocked for more than 469 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:439 state:D stack:0 pid:4210 tgid:4210 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eac89d84 r8:00000002 r7:60000113 r6:eac89d8c r5:850c4800
r4:850c4800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:850c4800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac89e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8502cd80
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:850c4800 r7:00000000 r6:83018200 r5:00001000 r4:7f055000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0719000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85127f8c r4:85127c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85127f8c r4:84673c80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:850c4800 r8:84673cac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84673c80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84673c80 r8:8027ed34 r7:eac85e60 r6:84673d00 r5:850c4800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac89fb0 to 0xeac89ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8502ccc0
INFO: task kworker/1:439:4210 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: adcb3000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac81e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8502cf00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:850c5400 r7:00000000 r6:83018200 r5:00001000 r4:7f057000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e075f000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8512c38c r4:8512c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8512c38c r4:84673e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:850c5400 r8:84673e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84673e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84673e00 r8:8027ed34 r7:eac85e60 r6:84673e80 r5:850c5400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac81fb0 to 0xeac81ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8502cf00
INFO: task kworker/1:440:4211 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: ae1e7000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:441:4215 blocked for more than 469 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:441 state:D stack:0 pid:4215 tgid:4215 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eac8dd84 r8:00000002 r7:60000113 r6:eac8dd8c r5:850c6000
r4:850c6000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:850c6000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac8de08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b2f0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:850c6000 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e47fb000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8512cb8c r4:8512c800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8512cb8c r4:84673d80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:850c6000 r8:84673dac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84673d80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84673d80 r8:8027ed34 r7:eac85e60 r6:84673f00 r5:850c6000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac8dfb0 to 0xeac8dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b2f000
INFO: task kworker/1:441:4215 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: ae46d000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:442:4216 blocked for more than 469 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:442 state:D stack:0 pid:4216 tgid:4216 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eac95d84 r8:00000002 r7:60000113 r6:eac95d8c r5:850c6c00
r4:850c6c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:850c6c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac95e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b2f380
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:850c6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f087000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e8825000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8512cf8c r4:8512cc00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8512cf8c r4:84673f80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:850c6c00 r8:84673fac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84673f80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84673f80 r8:8027ed34 r7:eac8de60 r6:84a6a000 r5:850c6c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac95fb0 to 0xeac95ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b2f000
INFO: task kworker/1:442:4216 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: aeca2000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:443:4219 blocked for more than 469 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:443 state:D stack:0 pid:4219 tgid:4219 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eac99d84 r8:00000002 r7:60000113 r6:eac99d8c r5:850c8000
r4:850c8000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:850c8000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac99e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b2f4c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:850c8000 r7:00000000 r6:83018200 r5:00001000 r4:7f089000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e8871000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8512d38c r4:8512d000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8512d38c r4:84a6a080
r4:00000001
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b2f200
INFO: task kworker/1:443:4219 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: aef50000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac9de08
r4:00000000
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
r5:00001000 r4:ea8ff000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8512db8c r4:84a6a180
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:850c8c00 r8:84a6a1ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a6a180
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a6a180 r8:8027ed34 r7:eac99e60 r6:84a6a200 r5:850c8c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac9dfb0 to 0xeac9dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b2f340
INFO: task kworker/1:444:4220 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: af750000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r4:00000001
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:445:4221 blocked for more than 469 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:445 state:D stack:0 pid:4221 tgid:4221 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eac91d84 r8:00000002 r7:60000013 r6:eac91d8c r5:850c9800
r4:850c9800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:850c9800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac91e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b2f6c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:850c9800 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ea895000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8512d78c r4:8512d400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8512d78c r4:84a6a300
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r4:84a6a300
1fa0: 00000000 00000000 00000000 00000000
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
r4:00000000
5d60: 80000013 ffffffff
r4:82abf1e4
r4:00000000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:446:4224 blocked for more than 469 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:446 state:D stack:0 pid:4224 tgid:4224 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaca1d84 r8:00000002 r7:60000113 r6:eaca1d8c r5:850ca400
r4:850ca400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:850ca400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaca1e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b2f940
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:850ca400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000001
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:447:4226 blocked for more than 469 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:447 state:D stack:0 pid:4226 tgid:4226 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaca9d84 r8:00000002 r7:60000013 r6:eaca9d8c r5:850cb000
r4:850cb000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:850cb000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaca9e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b2fc80
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:850cb000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaa4d000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8512e78c r4:8512e400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8512e78c r4:84a6a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:850cb000 r8:84a6a4ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a6a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a6a480 r8:8027ed34 r7:eaca1e60 r6:84a6a500 r5:850cb000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaca9fb0 to 0xeaca9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b2f740
INFO: task kworker/1:447:4226 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: b030d000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:448:4227 blocked for more than 469 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:448 state:D stack:0 pid:4227 tgid:4227 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eacb1d84 r8:00000002 r7:60000113 r6:eacb1d8c r5:850cbc00
r4:850cbc00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:850cbc00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacb1e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b2fb00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:850cbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f091000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ea93f000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8512e38c r4:8512e000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8512e38c r4:84a6a580
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:850cbc00 r8:84a6a5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a6a580
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a6a580 r8:8027ed34 r7:eaca9e60 r6:84a6a600 r5:850cbc00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeacb1fb0 to 0xeacb1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b2fa40
INFO: task kworker/1:448:4227 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: b04dd000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:449:4230 blocked for more than 469 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:449 state:D stack:0 pid:4230 tgid:4230 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eacb5d84 r8:00000002 r7:60000113 r6:eacb5d8c r5:850cc800
r4:850cc800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:850cc800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacb5e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8502ce00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:850cc800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eac0d000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8512ef8c r4:8512ec00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8512ef8c r4:84a6a680
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:850cc800 r8:84a6a6ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r10:00000000 r9:84a6a680 r8:8027ed34 r7:eaca9e60 r6:84a6a700 r5:850cc800
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b2fa80
INFO: task kworker/1:449:4230 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: b13e8000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:450:4232 blocked for more than 469 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:450 state:D stack:0 pid:4232 tgid:4232 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eacb9d84 r8:00000002 r7:60000113 r6:eacb9d8c r5:850cd400
r4:850cd400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:850cd400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacb9e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b2fdc0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:850cd400 r7:00000000 r6:83018200 r5:00001000 r4:7f095000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaa79000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8512eb8c r4:8512e800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8512eb8c r4:84a6a780
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:850cd400 r8:84a6a7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a6a780
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a6a780 r8:8027ed34 r7:eacb5e60 r6:84a6a800 r5:850cd400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeacb9fb0 to 0xeacb9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b2fc40
INFO: task kworker/1:450:4232 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: b27af000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
r4:00000000
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:8473bd40
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
r4:84b3cc00
r4:8473bd40
r4:850cec00
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacbde08
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846be600
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r4:84a6a980
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a6a980 r8:8027ed34 r7:eaca5e60 r6:84a6aa00 r5:850cec00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeacbdfb0 to 0xeacbdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:846be000
INFO: task kworker/1:452:4236 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: b2dea000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:453:4237 blocked for more than 470 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:453 state:D stack:0 pid:4237 tgid:4237 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eacc5d84 r8:00000002 r7:60000113 r6:eacc5d8c r5:851b0000
r4:851b0000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:851b0000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacc5e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846be300
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:851b0000 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eacd3000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8512f78c r4:8512f400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8512f78c r4:84a6aa80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:851b0000 r8:84a6aaac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a6aa80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a6aa80 r8:8027ed34 r7:eacbde60 r6:84a6ab00 r5:851b0000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeacc5fb0 to 0xeacc5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:846be240
INFO: task kworker/1:453:4237 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: b3303000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:00000000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
INFO: task kworker/1:454:4239 blocked for more than 470 seconds.
Call trace:
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacd1e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846be480
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:851b0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eacdf000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8512fb8c r4:8512f800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8512fb8c r4:84a6ab80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:851b0c00 r8:84a6abac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a6ab80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a6ab80 r8:8027ed34 r7:eacbde60 r6:84a6ac00 r5:851b0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeacd1fb0 to 0xeacd1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:846be180
INFO: task kworker/1:454:4239 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: b3672000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r4:00000001
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/1:455 state:D stack:0 pid:4242 tgid:4242 ppid:2 task_flags:0x4208060 flags:0x00000000
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eace9e08
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846be900
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:851b1800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ead03000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8513878c r4:85138400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8513878c r4:84a6ac80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:851b1800 r8:84a6acac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a6ac80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a6ac80 r8:8027ed34 r7:eacbde60 r6:84a6ad00 r5:851b1800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeace9fb0 to 0xeace9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:846be400
INFO: task kworker/1:455:4242 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
r4:dfe15dc0
r5:00001000 r4:dfa81000
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
INFO: task kworker/1:456:4243 blocked for more than 470 seconds.
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
Exception stack(0xeacf5fb0 to 0xeacf5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:846be400
INFO: task kworker/1:456:4243 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: b3fac000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
Workqueue: events bpf_prog_free_deferred
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacdde08
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
dfa0: 00000000 00000000 00000000 00000000
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
5d20: b42db000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:458:4247 blocked for more than 470 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:458 state:D stack:0 pid:4247 tgid:4247 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:ead49d84 r8:00000002 r7:60000113 r6:ead49d8c r5:851b4800
r4:851b4800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:851b4800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead49e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846bef80
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:851b4800 r7:00000000 r6:83018200 r5:00001000 r4:7f0d1000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ead27000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85138f8c r4:85138c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85138f8c r4:84a6af80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:851b4800 r8:84a6afac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a6af80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a6af80 r8:8027ed34 r7:eacdde60 r6:8467e000 r5:851b4800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xead49fb0 to 0xead49ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:846bea40
INFO: task kworker/1:458:4247 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: b4581000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:110:4249 blocked for more than 470 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:110 state:D stack:0 pid:4249 tgid:4249 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:ead55d84 r8:00000002 r7:60000113 r6:ead55d8c r5:851b6000
r4:851b6000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:851b6000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead55e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846794c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:851b6000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ead77000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84bedf8c r4:84bedc00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84bedf8c r4:84b46200
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:851b6000 r8:84b4622c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b46200
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b46200 r8:8027ed34 r7:eab2de60 r6:8467e080 r5:851b6000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xead55fb0 to 0xead55ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84679180
INFO: task kworker/0:110:4249 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: b49ce000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:459:4252 blocked for more than 470 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:459 state:D stack:0 pid:4252 tgid:4252 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:ead51d84 r8:00000002 r7:60000113 r6:ead51d8c r5:851b5400
r4:851b5400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:851b5400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead51e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846bec00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:851b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f0d3000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ead5f000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8513938c r4:85139000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8513938c r4:8467e100
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:851b5400 r8:8467e12c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8467e100
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8467e100 r8:8027ed34 r7:eacdde60 r6:8467e180 r5:851b5400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xead51fb0 to 0xead51ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:846beec0
INFO: task kworker/1:459:4252 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: b4e0d000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:460:4253 blocked for more than 470 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:460 state:D stack:0 pid:4253 tgid:4253 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:ead01d84 r8:00000002 r7:60000113 r6:ead01d8c r5:851b6c00
r4:851b6c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:851b6c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead01e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8502e780
r9:83018205 r8:851b6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0df000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:84b3cc00
r4:8473bd40
Call trace:
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead95e08
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r10:00000000 r9:84b46280 r8:8027ed34 r7:ead55e60 r6:8467e300 r5:850d8c00
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: b526d000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
r4:8473bd40
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
r4:850d9800
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eada1e08
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84679900
r7:dddced40 r6:83018000 r5:84bee78c r4:84b46300
r4:84b46300
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b46300 r8:8027ed34 r7:ead95e60 r6:8467e380 r5:850d9800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeada1fb0 to 0xeada1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84679340
INFO: task kworker/0:112:4257 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: b526d000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:461:4259 blocked for more than 470 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:461 state:D stack:0 pid:4259 tgid:4259 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eadadd84 r8:00000002 r7:60000013 r6:eadadd8c r5:850d8000
r4:850d8000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:850d8000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadade08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84679640
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r10:00000000 r9:8467e400 r8:8027ed34 r7:ead01e60 r6:8467e480 r5:850d8000
r4:8502e1c0
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: b57d3000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:00000000 r9:8467e500 r8:8027ed34 r7:ead01e60 r6:8467e580 r5:850db000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xead91fb0 to 0xead91ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8502e4c0
INFO: task kworker/1:462:4262 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: b5f9d000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:463:4263 blocked for more than 470 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:463 state:D stack:0 pid:4263 tgid:4263 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:ead81d84 r8:00000002 r7:60000113 r6:ead81d8c r5:850dbc00
r4:850dbc00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:850dbc00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead81e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8502e600
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:850dbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0dd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eadb7000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85139f8c r4:85139c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85139f8c r4:8467e600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:850dbc00 r8:8467e62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8467e600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8467e600 r8:8027ed34 r7:ead01e60 r6:8467e680 r5:850dbc00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xead81fb0 to 0xead81ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8502e440
INFO: task kworker/1:463:4263 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Exception stack(0xdfe15d20 to 0xdfe15d68)
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:464:4266 blocked for more than 470 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
Workqueue: events bpf_prog_free_deferred
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
r4:00000000
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eadcdd84 r8:00000002 r7:60000013 r6:eadcdd8c r5:850de000
r4:850de000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:850de000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadcde08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8502e6c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:850de000 r7:00000000 r6:83018200 r5:00001000 r4:7f065000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfdab000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8513af8c r4:8513ac00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8513af8c r4:8467e800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:850de000 r8:8467e82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8467e800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8467e800 r8:8027ed34 r7:eadc1e60 r6:8467e880 r5:850de000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeadcdfb0 to 0xeadcdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8502e4c0
INFO: task kworker/1:465:4267 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: b726c000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:113:4270 blocked for more than 470 seconds.
Call trace:
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab09e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r4:84b46380
Exception stack(0xeab09fb0 to 0xeab09ff8)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Exception stack(0xdfe15d20 to 0xdfe15d68)
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
INFO: task kworker/0:114:4272 blocked for more than 470 seconds.
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab3de08
r10:61c88647 r9:851b3000 r8:84b4642c r7:82804d40 r6:dddced40 r5:dddced60
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r4:8473bd40
r5:8485ec00 r4:829185c0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:00000000 r9:84b46480 r8:8027ed34 r7:ead95e60 r6:84b46500 r5:8485ec00
Exception stack(0xdfe15d20 to 0xdfe15d68)
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:466:4276 blocked for more than 470 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:466 state:D stack:0 pid:4276 tgid:4276 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaaadd84 r8:00000002 r7:60000113 r6:eaaadd8c r5:8485d400
r4:8485d400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8485d400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaade08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a32c40
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8485d400 r7:00000000 r6:83018200 r5:00001000 r4:7f067000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfdf3000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8513b38c r4:8513b000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8513b38c r4:8467ea00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8485d400 r8:8467ea2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8467ea00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8467ea00 r8:8027ed34 r7:eadcde60 r6:84b46580 r5:8485d400
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
r5:00001000 r4:dfa81000
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
Call trace:
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab51e08
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r7:ddde2d40 r6:83018200 r5:8520838c r4:8467ea80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8485e000 r8:8467eaac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8467ea80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8467ea80 r8:8027ed34 r7:eaaade60 r6:84b46600 r5:8485e000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeab51fb0 to 0xeab51ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8502ea00
INFO: task kworker/1:467:4278 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
r4:00000000
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
INFO: task kworker/1:468:4280 blocked for more than 471 seconds.
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab59e08
r5:00001000 r4:dff3b000
r4:00000001
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
task:kworker/0:116 state:D stack:0 pid:4283 tgid:4283 ppid:2 task_flags:0x4208060 flags:0x00000000
r4:00000000
r10:61c88647 r9:8485a400 r8:84b4672c r7:82804d40 r6:dddced40 r5:dddced60
Call trace:
r4:82abf1e4
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:117:4285 blocked for more than 471 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:117 state:D stack:0 pid:4285 tgid:4285 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eab79d84 r8:00000002 r7:60000113 r6:eab79d8c r5:8487b000
r4:8487b000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8487b000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab79e08
r5:84bef78c r4:84bef400
9fa0: 00000000 00000000 00000000 00000000
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r4:00000001
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:118:4287 blocked for more than 471 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:118 state:D stack:0 pid:4287 tgid:4287 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eab85d84 r8:00000002 r7:60000113 r6:eab85d8c r5:84875400
r4:84875400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r4:00000000
r10:61c88647 r9:84875400 r8:84b4692c r7:82804d40 r6:dddced40 r5:dddced60
r10:00000000 r9:84b46900 r8:8027ed34 r7:ead95e60 r6:84b46980 r5:84875400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeab85fb0 to 0xeab85ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84679180
INFO: task kworker/0:118:4287 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: b9eb8000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:469:4288 blocked for more than 471 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:469 state:D stack:0 pid:4288 tgid:4288 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eab7dd84 r8:00000002 r7:60000013 r6:eab7dd8c r5:84868000
r4:84868000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84868000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab7de08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85012640
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84868000 r7:00000000 r6:83018200 r5:00001000 r4:7f073000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e036b000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8513bf8c r4:8513bc00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8513bf8c r4:8467eb80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84868000 r8:8467ebac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8467eb80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8467eb80 r8:8027ed34 r7:eab51e60 r6:84b46a00 r5:84868000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeab7dfb0 to 0xeab7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85012240
INFO: task kworker/1:469:4288 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: ba309000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:119:4290 blocked for more than 471 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:119 state:D stack:0 pid:4290 tgid:4290 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eab9dd84 r8:00000002 r7:60000113 r6:eab9dd8c r5:84868c00
r4:84868c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84868c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab9de08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846b8400
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84868c00 r7:00000000 r6:83018000 r5:00001000 r4:7f077000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ea94f000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84beff8c r4:84befc00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84beff8c r4:84b46a80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84868c00 r8:84b46aac r7:82804d40 r6:dddced40 r5:dddced60
r4:84b46a80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b46a80 r8:8027ed34 r7:eab85e60 r6:84b46b00 r5:84868c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeab9dfb0 to 0xeab9dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:846796c0
INFO: task kworker/0:119:4290 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: ba309000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:470:4293 blocked for more than 471 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:470 state:D stack:0 pid:4293 tgid:4293 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eabb9d84 r8:00000002 r7:60000013 r6:eabb9d8c r5:84869800
r4:84869800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84869800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabb9e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85012a00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84869800 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ea9af000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8520878c r4:85208400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8520878c r4:8467ec00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84869800 r8:8467ec2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8467ec00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8467ec00 r8:8027ed34 r7:eab51e60 r6:84b46b80 r5:84869800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeabb9fb0 to 0xeabb9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85012580
INFO: task kworker/1:470:4293 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: bab78000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:120:4295 blocked for more than 471 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:120 state:D stack:0 pid:4295 tgid:4295 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eabb5d84 r8:00000002 r7:60000113 r6:eabb5d8c r5:8486b000
r4:8486b000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8486b000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabb5e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846b8680
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:8486b000 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ea98f000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:83eddb8c r4:83edd800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:83eddb8c r4:84b46c00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8486b000 r8:84b46c2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b46c00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b46c00 r8:8027ed34 r7:eab85e60 r6:84b46c80 r5:8486b000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeabb5fb0 to 0xeabb5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:846b8300
INFO: task kworker/0:120:4295 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: bab78000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:121:4298 blocked for more than 471 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:121 state:D stack:0 pid:4298 tgid:4298 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaba9d84 r8:00000002 r7:60000113 r6:eaba9d8c r5:8486bc00
r4:8486bc00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8486bc00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaba9e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85179b80
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:8486bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f033000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e03b7000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8520bf8c r4:8520bc00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:8520bf8c r4:84b46d00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8486bc00 r8:84b46d2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b46d00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b46d00 r8:8027ed34 r7:eabb5e60 r6:84b46d80 r5:8486bc00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaba9fb0 to 0xeaba9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:846b8480
INFO: task kworker/0:121:4298 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: bb275000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:122:4299 blocked for more than 471 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:122 state:D stack:0 pid:4299 tgid:4299 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eab99d84 r8:00000002 r7:60000113 r6:eab99d8c r5:8486c800
r4:8486c800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8486c800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab99e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846b8900
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:8486c800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eabc1000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8520ab8c r4:8520a800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:8520ab8c r4:84b46e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8486c800 r8:84b46e2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b46e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b46e00 r8:8027ed34 r7:eaba9e60 r6:84b46e80 r5:8486c800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeab99fb0 to 0xeab99ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:846b8480
INFO: task kworker/0:122:4299 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: bb275000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:471:4301 blocked for more than 471 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:471 state:D stack:0 pid:4301 tgid:4301 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eadd1d84 r8:00000002 r7:60000013 r6:eadd1d8c r5:8486e000
r4:8486e000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8486e000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadd1e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85012ac0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8486e000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaaaf000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85208b8c r4:85208800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85208b8c r4:8467ec80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8486e000 r8:8467ecac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8467ec80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8467ec80 r8:8027ed34 r7:eabb9e60 r6:84b46f00 r5:8486e000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeadd1fb0 to 0xeadd1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85012980
INFO: task kworker/1:471:4301 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: bb700000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
Workqueue: events bpf_prog_free_deferred
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadd9e08
r4:00000000
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r5:85208f8c r4:85208c00
r10:00000000 r9:8467ed00 r8:8027ed34 r7:eadd1e60 r6:84b46f80 r5:8486a400
r4:85012940
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: bbb3f000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:473:4305 blocked for more than 471 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:473 state:D stack:0 pid:4305 tgid:4305 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eade1d84 r8:00000002 r7:60000013 r6:eade1d8c r5:84918000
r4:84918000
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r4:00000000
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85012f40
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
Exception stack(0xeade1fb0 to 0xeade1ff8)
r4:85012a40
INFO: task kworker/1:473:4305 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: bbf17000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:474:4306 blocked for more than 471 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:474 state:D stack:0 pid:4306 tgid:4306 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eade5d84 r8:00000002 r7:60000113 r6:eade5d8c r5:84918c00
r4:84918c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84918c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eade5e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85012dc0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84918c00 r7:00000000 r6:83018200 r5:00001000 r4:7f083000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaaf3000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8520938c r4:85209000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8520938c r4:8467ee00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84918c00 r8:8467ee2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8467ee00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8467ee00 r8:8027ed34 r7:eade1e60 r6:84940080 r5:84918c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeade5fb0 to 0xeade5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85012d00
INFO: task kworker/1:474:4306 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: bc24f000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:475:4308 blocked for more than 471 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:475 state:D stack:0 pid:4308 tgid:4308 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eadedd84 r8:00000002 r7:60000113 r6:eadedd8c r5:8491a400
r4:8491a400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8491a400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadede08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a32cc0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8491a400 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eab71000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8520a38c r4:8520a000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8520a38c r4:8467ee80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8491a400 r8:8467eeac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8467ee80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8467ee80 r8:8027ed34 r7:eade1e60 r6:84940100 r5:8491a400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeadedfb0 to 0xeadedff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85012d40
INFO: task kworker/1:475:4308 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: bc9a8000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:476:4310 blocked for more than 471 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:476 state:D stack:0 pid:4310 tgid:4310 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eadf5d84 r8:00000002 r7:60000113 r6:eadf5d8c r5:84919800
r4:84919800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84919800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadf5e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85012740
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84919800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eab35000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85209b8c r4:85209800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85209b8c r4:8467ef00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84919800 r8:8467ef2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8467ef00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8467ef00 r8:8027ed34 r7:eadede60 r6:84940180 r5:84919800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeadf5fb0 to 0xeadf5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85012cc0
INFO: task kworker/1:476:4310 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: bcc88000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
task:kworker/1:477 state:D stack:0 pid:4312 tgid:4312 ppid:2 task_flags:0x4208060 flags:0x00000000
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadfde08
r4:00000000
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r4:00000001
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
r4:85012cc0
INFO: task kworker/1:477:4312 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: bd238000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Not tainted 6.16.0-rc2-syzkaller #0
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae05e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85179a00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8491bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfed1000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8520bb8c r4:8520b800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8520bb8c r4:8500e000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8491bc00 r8:8500e02c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8500e000
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8500e000 r8:8027ed34 r7:eadede60 r6:84940280 r5:8491bc00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae05fb0 to 0xeae05ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
INFO: task kworker/1:478:4314 is blocked on a mutex likely owned by task kworker/0:51:3517.
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
r4:00000000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/1:479 state:D stack:0 pid:4316 tgid:4316 ppid:2 task_flags:0x4208060 flags:0x00000000
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae0de08
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851790c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8491c800 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eab89000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8520a78c r4:8520a400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8520a78c r4:8500e080
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8491c800 r8:8500e0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8500e080
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8500e080 r8:8027ed34 r7:eae05e60 r6:84940300 r5:8491c800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae0dfb0 to 0xeae0dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a32ac0
INFO: task kworker/1:479:4316 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: bdd63000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Not tainted 6.16.0-rc2-syzkaller #0
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae15e08
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85179580
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8491d400 r7:00000000 r6:83018200 r5:00001000 r4:7f029000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa23000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8520af8c r4:8520ac00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8520af8c r4:8500e100
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8491d400 r8:8500e12c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8500e100
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8500e100 r8:8027ed34 r7:eae05e60 r6:84940380 r5:8491d400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae15fb0 to 0xeae15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85179000
INFO: task kworker/1:480:4318 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: be052000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r4:00000001
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
Exception stack(0xeae11fb0 to 0xeae11ff8)
INFO: task kworker/0:123:4320 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: be2ae000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
INFO: task kworker/0:124:4323 blocked for more than 471 seconds.
Call trace:
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabc5e08
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
Exception stack(0xeabc5fb0 to 0xeabc5ff8)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85001080
INFO: task kworker/0:124:4323 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: be6ac000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r4:00000001
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/1:481 state:D stack:0 pid:4325 tgid:4325 ppid:2 task_flags:0x4208060 flags:0x00000000
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabfde08
r4:00000000
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r4:85179480
INFO: task kworker/1:481:4325 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: be966000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:482:4328 blocked for more than 471 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:482 state:D stack:0 pid:4328 tgid:4328 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
r10:829185c4 r9:eac35d84 r8:00000002 r7:60000113 r6:eac35d8c r5:851b8000
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac35e08
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
r4:00000000
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r4:00000001
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r4:85179680
INFO: task kworker/1:482:4328 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: be966000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:483:4331 blocked for more than 472 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:483 state:D stack:0 pid:4331 tgid:4331 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eacd9d84 r8:00000002 r7:60000113 r6:eacd9d8c r5:851b8c00
r4:851b8c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:851b8c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacd9e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85179e00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:851b8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f037000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0421000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8520c78c r4:8520c400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8520c78c r4:8500e280
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:851b8c00 r8:8500e2ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8500e280
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8500e280 r8:8027ed34 r7:eae05e60 r6:84940700 r5:851b8c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeacd9fb0 to 0xeacd9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85179780
INFO: task kworker/1:483:4331 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: bf6a5000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r4:8473bd40
Not tainted 6.16.0-rc2-syzkaller #0
Call trace:
r5:851ba400 r4:829185c0
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eace5e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85179cc0
r5:00001000 r4:e03f3000
r5:8520c38c r4:8520c000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85179780
INFO: task kworker/1:484:4332 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: bfa9f000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
r4:8473bd40
Not tainted 6.16.0-rc2-syzkaller #0
r10:829185c4 r9:eacf1d84 r8:00000002 r7:60000113 r6:eacf1d8c r5:851b9800
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacf1e08
r4:00000000
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:851b9800 r8:8494082c r7:82804d40 r6:dddced40 r5:dddced60
r4:84940800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84940800 r8:8027ed34 r7:eaba9e60 r6:84940880 r5:851b9800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeacf1fb0 to 0xeacf1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85001540
INFO: task kworker/0:125:4334 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: bfdf5000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:00000000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r4:84b3cc00
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:485:4336 blocked for more than 472 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:485 state:D stack:0 pid:4336 tgid:4336 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:ead65d84 r8:00000002 r7:60000113 r6:ead65d8c r5:851bc800
r4:851bc800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:851bc800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead65e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85179fc0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:851bc800 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:486:4338 blocked for more than 472 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:486 state:D stack:0 pid:4338 tgid:4338 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:ead9dd84 r8:00000002 r7:60000113 r6:ead9dd8c r5:851bbc00
r4:851bbc00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:851bbc00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead9de08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a32dc0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:851bbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e055d000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8520d38c r4:8520d000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8520d38c r4:8500e400
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:851bbc00 r8:8500e42c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8500e400
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8500e400 r8:8027ed34 r7:ead65e60 r6:84940980 r5:851bbc00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xead9dfb0 to 0xead9dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85179c80
INFO: task kworker/1:486:4338 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
Exception stack(0xdfe15d20 to 0xdfe15d68)
r4:dfe15dc0
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Not tainted 6.16.0-rc2-syzkaller #0
r10:829185c4 r9:eada9d84 r8:00000002 r7:60000013 r6:eada9d8c r5:851be000
r4:851be000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:851be000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eada9e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85001cc0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:851be000 r7:00000000 r6:83018000 r5:00001000 r4:7f039000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0451000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85184f8c r4:85184c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:85184f8c r4:84940a00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:851be000 r8:84940a2c r7:82804d40 r6:dddced40 r5:dddced60
r4:85001b40
Workqueue: events bpf_prog_free_deferred
Exception stack(0xdfe15d20 to 0xdfe15d68)
r4:82abf1e4
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:487:4342 blocked for more than 472 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:487 state:D stack:0 pid:4342 tgid:4342 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eadc9d84 r8:00000002 r7:60000113 r6:eadc9d8c r5:851bec00
r4:851bec00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:851bec00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadc9e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85179240
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:851bec00 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e052f000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8520cf8c r4:8520cc00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8520cf8c r4:8500e480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:851bec00 r8:8500e4ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8500e480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8500e480 r8:8027ed34 r7:ead9de60 r6:84940b00 r5:851bec00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeadc9fb0 to 0xeadc9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
5d60: 80000013 ffffffff
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
Not tainted 6.16.0-rc2-syzkaller #0
Workqueue: events bpf_prog_free_deferred
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae1de08
r4:00000000
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
r4:00000000
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r10:00000000 r9:84940b80 r8:8027ed34 r7:eacf1e60 r6:84940c00 r5:8486ec00
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
r4:00000000
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:488:4345 blocked for more than 472 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:488 state:D stack:0 pid:4345 tgid:4345 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eae21d84 r8:00000002 r7:60000113 r6:eae21d8c r5:851bb000
r4:851bb000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:851bb000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae21e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85019a80
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:851bb000 r7:00000000 r6:83018200 r5:00001000 r4:7f051000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e8859000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8520f78c r4:8520f400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8520f78c r4:8500e500
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:851bb000 r8:8500e52c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8500e500
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8500e500 r8:8027ed34 r7:ead9de60 r6:84940c80 r5:851bb000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae21fb0 to 0xeae21ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85179180
INFO: task kworker/1:488:4345 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: c070b000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:489:4347 blocked for more than 472 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:489 state:D stack:0 pid:4347 tgid:4347 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eae29d84 r8:00000002 r7:60000013 r6:eae29d8c r5:847f8c00
r4:847f8c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:847f8c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae29e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85179200
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:847f8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0593000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8520d78c r4:8520d400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8520d78c r4:8500e580
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:847f8c00 r8:8500e5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8500e580
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8500e580 r8:8027ed34 r7:eae21e60 r6:84940d00 r5:847f8c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae29fb0 to 0xeae29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a32f80
INFO: task kworker/1:489:4347 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: c070b000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:490:4349 blocked for more than 472 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:490 state:D stack:0 pid:4349 tgid:4349 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eae31d84 r8:00000002 r7:60000113 r6:eae31d8c r5:847fa400
r4:847fa400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:847fa400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae31e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850190c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:847fa400 r7:00000000 r6:83018200 r5:00001000 r4:7f043000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e05cb000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8520db8c r4:8520d800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8520db8c r4:8500e600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:847fa400 r8:8500e62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8500e600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8500e600 r8:8027ed34 r7:eae21e60 r6:84940d80 r5:847fa400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae31fb0 to 0xeae31ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85019080
INFO: task kworker/1:490:4349 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: c070b000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:491:4351 blocked for more than 472 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:491 state:D stack:0 pid:4351 tgid:4351 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eae39d84 r8:00000002 r7:60000013 r6:eae39d8c r5:847f9800
r4:847f9800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:847f9800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae39e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850192c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:847f9800 r7:00000000 r6:83018200 r5:00001000 r4:7f045000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e065d000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8520df8c r4:8520dc00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8520df8c r4:8500e680
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:847f9800 r8:8500e6ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8500e680
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8500e680 r8:8027ed34 r7:eae21e60 r6:84940e00 r5:847f9800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae39fb0 to 0xeae39ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85019200
INFO: task kworker/1:491:4351 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: c0c6d000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:492:4353 blocked for more than 472 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:492 state:D stack:0 pid:4353 tgid:4353 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eae41d84 r8:00000002 r7:60000113 r6:eae41d8c r5:847fc800
r4:847fc800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:847fc800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae41e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85019440
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:847fc800 r7:00000000 r6:83018200 r5:00001000 r4:7f047000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e06a5000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8520e38c r4:8520e000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8520e38c r4:8500e700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:847fc800 r8:8500e72c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8500e700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8500e700 r8:8027ed34 r7:eae21e60 r6:84940e80 r5:847fc800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae41fb0 to 0xeae41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85019140
INFO: task kworker/1:492:4353 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: c0c6d000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:493:4355 blocked for more than 472 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:493 state:D stack:0 pid:4355 tgid:4355 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eae49d84 r8:00000002 r7:60000113 r6:eae49d8c r5:847fbc00
r4:847fbc00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:847fbc00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae49e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85019540
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:847fbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f049000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e06dd000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8520e78c r4:8520e400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8520e78c r4:8500e780
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:847fbc00 r8:8500e7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8500e780
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8500e780 r8:8027ed34 r7:eae21e60 r6:84940f00 r5:847fbc00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae49fb0 to 0xeae49ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85019480
INFO: task kworker/1:493:4355 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: c148f000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:494:4357 blocked for more than 472 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:494 state:D stack:0 pid:4357 tgid:4357 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eae51d84 r8:00000002 r7:60000113 r6:eae51d8c r5:847fb000
r4:847fb000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:847fb000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae51e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85019700
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:847fb000 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e074d000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8520eb8c r4:8520e800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8520eb8c r4:8500e800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:847fb000 r8:8500e82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8500e800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8500e800 r8:8027ed34 r7:eae21e60 r6:84940f80 r5:847fb000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae51fb0 to 0xeae51ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85019340
INFO: task kworker/1:494:4357 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: c1d8f000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:495:4359 blocked for more than 472 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:495 state:D stack:0 pid:4359 tgid:4359 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eae59d84 r8:00000002 r7:60000113 r6:eae59d8c r5:847fd400
r4:847fd400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:847fd400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae59e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85019800
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:847fd400 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e47d1000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8520ef8c r4:8520ec00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8520ef8c r4:8500e880
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:847fd400 r8:8500e8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8500e880
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8500e880 r8:8027ed34 r7:eae21e60 r6:851e9000 r5:847fd400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae59fb0 to 0xeae59ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85019580
INFO: task kworker/1:495:4359 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: c20bd000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:496:4361 blocked for more than 472 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:496 state:D stack:0 pid:4361 tgid:4361 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eae61d84 r8:00000002 r7:60000113 r6:eae61d8c r5:847fe000
r4:847fe000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:847fe000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae61e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85019940
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:847fe000 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e8809000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8520f38c r4:8520f000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8520f38c r4:8500e900
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:847fe000 r8:8500e92c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8500e900
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8500e900 r8:8027ed34 r7:eae21e60 r6:851e9080 r5:847fe000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae61fb0 to 0xeae61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85019600
INFO: task kworker/1:496:4361 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: c20bd000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:497:4363 blocked for more than 472 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:497 state:D stack:0 pid:4363 tgid:4363 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eae69d84 r8:00000002 r7:60000013 r6:eae69d8c r5:847fec00
r4:847fec00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:847fec00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae69e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85019bc0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:847fec00 r7:00000000 r6:83018200 r5:00001000 r4:7f053000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ea897000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8520fb8c r4:8520f800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8520fb8c r4:8500e980
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:847fec00 r8:8500e9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8500e980
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8500e980 r8:8027ed34 r7:eae21e60 r6:851e9100 r5:847fec00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae69fb0 to 0xeae69ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:850197c0
INFO: task kworker/1:497:4363 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: c2c55000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:498:4366 blocked for more than 472 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:498 state:D stack:0 pid:4366 tgid:4366 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eae75d84 r8:00000002 r7:60000113 r6:eae75d8c r5:84758c00
r4:84758c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84758c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae75e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85001c00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84758c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85210b8c r4:85210800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85210b8c r4:8500ea00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84758c00 r8:8500ea2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8500ea00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8500ea00 r8:8027ed34 r7:eae69e60 r6:851e9180 r5:84758c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae75fb0 to 0xeae75ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85019900
INFO: task kworker/1:498:4366 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: c2c55000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:499:4368 blocked for more than 472 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:499 state:D stack:0 pid:4368 tgid:4368 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eae7dd84 r8:00000002 r7:60000113 r6:eae7dd8c r5:8475a400
r4:8475a400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8475a400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae7de08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85019cc0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8475a400 r7:00000000 r6:83018200 r5:00001000 r4:7f055000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ea91f000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8520ff8c r4:8520fc00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8520ff8c r4:8500ea80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8475a400 r8:8500eaac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8500ea80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8500ea80 r8:8027ed34 r7:eae75e60 r6:851e9200 r5:8475a400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85019c00
INFO: task kworker/1:499:4368 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: c2f82000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:500:4369 blocked for more than 472 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:500 state:D stack:0 pid:4369 tgid:4369 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eae81d84 r8:00000002 r7:60000113 r6:eae81d8c r5:84758000
r4:84758000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84758000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae81e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85019e40
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84758000 r7:00000000 r6:83018200 r5:00001000 r4:7f057000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ea93d000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8521038c r4:85210000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8521038c r4:8500eb00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84758000 r8:8500eb2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8500eb00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8500eb00 r8:8027ed34 r7:eae75e60 r6:851e9280 r5:84758000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae81fb0 to 0xeae81ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85019ac0
INFO: task kworker/1:500:4369 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: c2f82000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:501:4371 blocked for more than 472 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:501 state:D stack:0 pid:4371 tgid:4371 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eae89d84 r8:00000002 r7:60000013 r6:eae89d8c r5:84759800
r4:84759800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84759800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae89e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85019f40
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84759800 r7:00000000 r6:83018200 r5:00001000 r4:7f059000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaa63000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8521078c r4:85210400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8521078c r4:8500eb80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84759800 r8:8500ebac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8500eb80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8500eb80 r8:8027ed34 r7:eae75e60 r6:851e9300 r5:84759800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae89fb0 to 0xeae89ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85019e80
INFO: task kworker/1:501:4371 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: c359d000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:502:4373 blocked for more than 472 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:502 state:D stack:0 pid:4373 tgid:4373 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eae91d84 r8:00000002 r7:60000113 r6:eae91d8c r5:8475b000
r4:8475b000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8475b000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae91e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f5480
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8475b000 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:df9d3000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8521178c r4:85211400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8521178c r4:8500ec00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8475b000 r8:8500ec2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8500ec00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8500ec00 r8:8027ed34 r7:eae75e60 r6:851e9380 r5:8475b000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae91fb0 to 0xeae91ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85001e80
INFO: task kworker/1:502:4373 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: c359d000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:503:4375 blocked for more than 472 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:503 state:D stack:0 pid:4375 tgid:4375 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eae85d84 r8:00000002 r7:60000113 r6:eae85d8c r5:850dc800
r4:850dc800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:850dc800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae85e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f53c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:850dc800 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eac37000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8521138c r4:85211000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8521138c r4:8500ec80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:850dc800 r8:8500ecac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8500ec80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8500ec80 r8:8027ed34 r7:eae91e60 r6:8500ed00 r5:850dc800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae85fb0 to 0xeae85ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85001e80
INFO: task kworker/1:503:4375 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: c4235000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:128:4377 blocked for more than 472 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:128 state:D stack:0 pid:4377 tgid:4377 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eae99d84 r8:00000002 r7:60000113 r6:eae99d8c r5:851e1800
r4:851e1800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:851e1800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae99e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8530a040
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:851e1800 r7:00000000 r6:83018000 r5:00001000 r4:7f045000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaa7f000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85187b8c r4:85187800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:85187b8c r4:851e9400
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:851e1800 r8:851e942c r7:82804d40 r6:dddced40 r5:dddced60
r4:851e9400
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:851e9400 r8:8027ed34 r7:eacf1e60 r6:851e9480 r5:851e1800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae99fb0 to 0xeae99ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b4be80
INFO: task kworker/0:128:4377 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: c4235000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:129:4379 blocked for more than 472 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:129 state:D stack:0 pid:4379 tgid:4379 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eac09d84 r8:00000002 r7:60000113 r6:eac09d8c r5:8475c800
r4:8475c800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8475c800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac09e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84682480
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:8475c800 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e001b000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8518578c r4:85185400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:8518578c r4:851e9500
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8475c800 r8:851e952c r7:82804d40 r6:dddced40 r5:dddced60
r4:851e9500
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:851e9500 r8:8027ed34 r7:eae99e60 r6:851e9580 r5:8475c800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac09fb0 to 0xeac09ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b4be80
INFO: task kworker/0:129:4379 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: c48eb000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:504:4382 blocked for more than 472 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:504 state:D stack:0 pid:4382 tgid:4382 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eae09d84 r8:00000002 r7:60000013 r6:eae09d8c r5:8475ec00
r4:8475ec00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8475ec00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae09e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f55c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8475ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfb87000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85211b8c r4:85211800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85211b8c r4:8500ed80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8475ec00 r8:8500edac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8500ed80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8500ed80 r8:8027ed34 r7:eae91e60 r6:851e9600 r5:8475ec00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae09fb0 to 0xeae09ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:851f5340
INFO: task kworker/1:504:4382 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: c48eb000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:505:4384 blocked for more than 472 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:505 state:D stack:0 pid:4384 tgid:4384 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaea1d84 r8:00000002 r7:60000113 r6:eaea1d8c r5:8475e000
r4:8475e000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8475e000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaea1e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f5c40
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8475e000 r7:00000000 r6:83018200 r5:00001000 r4:7f067000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dff7f000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85212f8c r4:85212c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85212f8c r4:8500ee00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8475e000 r8:8500ee2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8500ee00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8500ee00 r8:8027ed34 r7:eae09e60 r6:851e9680 r5:8475e000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaea1fb0 to 0xeaea1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:851f5440
INFO: task kworker/1:505:4384 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: c4c99000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:506:4385 blocked for more than 472 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:506 state:D stack:0 pid:4385 tgid:4385 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaea5d84 r8:00000002 r7:60000113 r6:eaea5d8c r5:8475bc00
r4:8475bc00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8475bc00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaea5e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f5440
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8475bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfbe7000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85211f8c r4:85211c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85211f8c r4:8500ee80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8475bc00 r8:8500eeac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8500ee80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8500ee80 r8:8027ed34 r7:eaea1e60 r6:851e9700 r5:8475bc00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaea5fb0 to 0xeaea5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:851f5440
INFO: task kworker/1:506:4385 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: c4f41000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:507:4387 blocked for more than 473 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:507 state:D stack:0 pid:4387 tgid:4387 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaeadd84 r8:00000002 r7:60000113 r6:eaeadd8c r5:847f8000
r4:847f8000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:847f8000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaeade08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f5880
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:847f8000 r7:00000000 r6:83018200 r5:00001000 r4:7f061000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc75000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8521238c r4:85212000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8521238c r4:8500ef00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:847f8000 r8:8500ef2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8500ef00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8500ef00 r8:8027ed34 r7:eaea1e60 r6:851e9780 r5:847f8000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaeadfb0 to 0xeaeadff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:851f5600
INFO: task kworker/1:507:4387 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: c5206000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:508:4389 blocked for more than 473 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:508 state:D stack:0 pid:4389 tgid:4389 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaeb5d84 r8:00000002 r7:60000013 r6:eaeb5d8c r5:847e0000
r4:847e0000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:847e0000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaeb5e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f59c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:847e0000 r7:00000000 r6:83018200 r5:00001000 r4:7f063000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfdb7000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8521278c r4:85212400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8521278c r4:8500ef80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:847e0000 r8:8500efac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8500ef80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8500ef80 r8:8027ed34 r7:eaea1e60 r6:851e9800 r5:847e0000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaeb5fb0 to 0xeaeb5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:851f5780
INFO: task kworker/1:508:4389 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: c5542000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:509:4391 blocked for more than 473 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:509 state:D stack:0 pid:4391 tgid:4391 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaebdd84 r8:00000002 r7:60000113 r6:eaebdd8c r5:847e1800
r4:847e1800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:847e1800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaebde08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f5ac0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:847e1800 r7:00000000 r6:83018200 r5:00001000 r4:7f065000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dff2b000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85212b8c r4:85212800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85212b8c r4:851f9000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:847e1800 r8:851f902c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:851f9000
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:851f9000 r8:8027ed34 r7:eaea1e60 r6:851e9880 r5:847e1800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaebdfb0 to 0xeaebdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:851f5840
INFO: task kworker/1:509:4391 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: c566e000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:510:4393 blocked for more than 473 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:510 state:D stack:0 pid:4393 tgid:4393 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaec5d84 r8:00000002 r7:60000113 r6:eaec5d8c r5:847e3000
r4:847e3000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:847e3000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaec5e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f5fc0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:847e3000 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0369000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8521378c r4:85213400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8521378c r4:851f9080
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:847e3000 r8:851f90ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:851f9080
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:851f9080 r8:8027ed34 r7:eaea1e60 r6:851e9900 r5:847e3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaec5fb0 to 0xeaec5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:851f5980
INFO: task kworker/1:510:4393 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: c59e0000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:511:4395 blocked for more than 473 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:511 state:D stack:0 pid:4395 tgid:4395 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaecdd84 r8:00000002 r7:60000113 r6:eaecdd8c r5:847e2400
r4:847e2400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:847e2400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaecde08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f5bc0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:847e2400 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e881b000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85213b8c r4:85213800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85213b8c r4:851f9100
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:847e2400 r8:851f912c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:851f9100
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:851f9100 r8:8027ed34 r7:eaec5e60 r6:851e9980 r5:847e2400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaecdfb0 to 0xeaecdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:851f5a00
INFO: task kworker/1:511:4395 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: c5d77000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:512:4399 blocked for more than 473 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:512 state:D stack:0 pid:4399 tgid:4399 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaec9d84 r8:00000002 r7:60000013 r6:eaec9d8c r5:847e3c00
r4:847e3c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:847e3c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaec9e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b4b100
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:847e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f073000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ea98b000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8521438c r4:85214000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8521438c r4:851f9180
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:847e3c00 r8:851f91ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:851f9180
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:851f9180 r8:8027ed34 r7:eaecde60 r6:851e9a00 r5:847e3c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaec9fb0 to 0xeaec9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:851f5040
INFO: task kworker/1:512:4399 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: c6db3000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:513:4402 blocked for more than 473 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:513 state:D stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaed5d84 r8:00000002 r7:60000113 r6:eaed5d8c r5:847e6000
r4:847e6000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:847e6000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaed5e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f5e40
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:847e6000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ea95f000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85213f8c r4:85213c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85213f8c r4:851f9200
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:847e6000 r8:851f922c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:851f9200
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:851f9200 r8:8027ed34 r7:eaec9e60 r6:851e9a80 r5:847e6000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaed5fb0 to 0xeaed5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:851f5040
INFO: task kworker/1:513:4402 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: c6db3000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:514:4404 blocked for more than 473 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:514 state:D stack:0 pid:4404 tgid:4404 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaed9d84 r8:00000002 r7:60000113 r6:eaed9d8c r5:847e4800
r4:847e4800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:847e4800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaed9e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a57300
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:847e4800 r7:00000000 r6:83018200 r5:00001000 r4:7f077000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaabf000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85214b8c r4:85214800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85214b8c r4:851f9280
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:847e4800 r8:851f92ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:851f9280
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:851f9280 r8:8027ed34 r7:eaec9e60 r6:851e9b00 r5:847e4800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaed9fb0 to 0xeaed9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b4b080
INFO: task kworker/1:514:4404 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: c6f65000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:130:4405 blocked for more than 473 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:130 state:D stack:0 pid:4405 tgid:4405 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaeddd84 r8:00000002 r7:60000113 r6:eaeddd8c r5:847e6c00
r4:847e6c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:847e6c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaedde08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850e62c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:847e6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eadb3000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8521c78c r4:8521c400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:8521c78c r4:851e9b80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:847e6c00 r8:851e9bac r7:82804d40 r6:dddced40 r5:dddced60
r4:851e9b80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:851e9b80 r8:8027ed34 r7:eae99e60 r6:851e9c00 r5:847e6c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaeddfb0 to 0xeaeddff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84682680
INFO: task kworker/0:130:4405 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: c76ba000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:515:4406 blocked for more than 473 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:515 state:D stack:0 pid:4406 tgid:4406 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaed1d84 r8:00000002 r7:60000113 r6:eaed1d8c r5:851e3000
r4:851e3000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:851e3000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaed1e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a570c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:851e3000 r7:00000000 r6:83018200 r5:00001000 r4:7f075000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ea9b5000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8521478c r4:85214400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8521478c r4:851f9300
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:851e3000 r8:851f932c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:851f9300
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:851f9300 r8:8027ed34 r7:eaed9e60 r6:851f9380 r5:851e3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaed1fb0 to 0xeaed1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a57000
INFO: task kworker/1:515:4406 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: c7bf6000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:516:4409 blocked for more than 473 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:516 state:D stack:0 pid:4409 tgid:4409 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eac01d84 r8:00000002 r7:60000013 r6:eac01d8c r5:851e3c00
r4:851e3c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:851e3c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac01e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a57480
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:851e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaae5000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85214f8c r4:85214c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85214f8c r4:851f9400
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:851e3c00 r8:851f942c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:851f9400
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:851f9400 r8:8027ed34 r7:eaed9e60 r6:851f9480 r5:851e3c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac01fb0 to 0xeac01ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a57240
INFO: task kworker/1:516:4409 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: c7fd4000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:517:4411 blocked for more than 473 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:517 state:D stack:0 pid:4411 tgid:4411 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaee1d84 r8:00000002 r7:60000113 r6:eaee1d8c r5:851e4800
r4:851e4800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:851e4800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaee1e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a57900
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:851e4800 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eab61000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85215b8c r4:85215800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85215b8c r4:851f9500
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:851e4800 r8:851f952c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:851f9500
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:851f9500 r8:8027ed34 r7:eac01e60 r6:851f9580 r5:851e4800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaee1fb0 to 0xeaee1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a57280
INFO: task kworker/1:517:4411 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: c7fd4000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:518:4412 blocked for more than 473 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:518 state:D stack:0 pid:4412 tgid:4412 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eae95d84 r8:00000002 r7:60000013 r6:eae95d8c r5:851e5400
r4:851e5400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:851e5400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae95e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a576c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:851e5400 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eab1d000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8521538c r4:85215000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8521538c r4:851f9600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:851e5400 r8:851f962c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:851f9600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:851f9600 r8:8027ed34 r7:eaee1e60 r6:851f9680 r5:851e5400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae95fb0 to 0xeae95ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a57280
INFO: task kworker/1:518:4412 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: c7fd4000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:519:4415 blocked for more than 473 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:519 state:D stack:0 pid:4415 tgid:4415 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaee9d84 r8:00000002 r7:60000113 r6:eaee9d8c r5:851e6000
r4:851e6000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:851e6000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaee9e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a577c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:851e6000 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eab33000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8521578c r4:85215400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8521578c r4:851f9700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:851e6000 r8:851f972c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:851f9700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:851f9700 r8:8027ed34 r7:eaee1e60 r6:851f9780 r5:851e6000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaee9fb0 to 0xeaee9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a57540
INFO: task kworker/1:519:4415 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: c8529000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:520:4416 blocked for more than 473 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:520 state:D stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaeedd84 r8:00000002 r7:60000013 r6:eaeedd8c r5:851e6c00
r4:851e6c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:851e6c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaeede08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a57a80
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:851e6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f081000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eab81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85215f8c r4:85215c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85215f8c r4:851f9800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:851e6c00 r8:851f982c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:851f9800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:851f9800 r8:8027ed34 r7:eaee1e60 r6:851f9880 r5:851e6c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaeedfb0 to 0xeaeedff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a57840
INFO: task kworker/1:520:4416 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: c8bab000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:521:4419 blocked for more than 473 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:521 state:D stack:0 pid:4419 tgid:4419 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaef1d84 r8:00000002 r7:60000113 r6:eaef1d8c r5:851e2400
r4:851e2400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:851e2400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaef1e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a57c40
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:851e2400 r7:00000000 r6:83018200 r5:00001000 r4:7f083000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eabb1000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8521638c r4:85216000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8521638c r4:851f9900
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:851e2400 r8:851f992c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:851f9900
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:851f9900 r8:8027ed34 r7:eaeede60 r6:851f9980 r5:851e2400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaef1fb0 to 0xeaef1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a57880
INFO: task kworker/1:521:4419 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: c8dd6000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:522:4421 blocked for more than 473 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:522 state:D stack:0 pid:4421 tgid:4421 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaf01d84 r8:00000002 r7:60000113 r6:eaf01d8c r5:8475d400
r4:8475d400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8475d400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf01e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a57d40
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8475d400 r7:00000000 r6:83018200 r5:00001000 r4:7f085000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eabdb000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8521678c r4:85216400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8521678c r4:851f9a00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8475d400 r8:851f9a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:851f9a00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:851f9a00 r8:8027ed34 r7:eaef1e60 r6:851e9c80 r5:8475d400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf01fb0 to 0xeaf01ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a57ac0
INFO: task kworker/1:522:4421 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: c91e7000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:523:4423 blocked for more than 473 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:523 state:D stack:0 pid:4423 tgid:4423 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaf09d84 r8:00000002 r7:60000113 r6:eaf09d8c r5:851bd400
r4:851bd400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:851bd400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf09e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a57f00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:851bd400 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eac55000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85216b8c r4:85216800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85216b8c r4:851f9a80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:851bd400 r8:851f9aac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:851f9a80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:851f9a80 r8:8027ed34 r7:eaf01e60 r6:851e9d00 r5:851bd400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf09fb0 to 0xeaf09ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a57c80
INFO: task kworker/1:523:4423 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: c9381000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:524:4424 blocked for more than 473 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:524 state:D stack:0 pid:4424 tgid:4424 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaf0dd84 r8:00000002 r7:60000013 r6:eaf0dd8c r5:847e0c00
r4:847e0c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:847e0c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf0de08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b4b800
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:847e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eacbf000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85216f8c r4:85216c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85216f8c r4:851f9b00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:847e0c00 r8:851f9b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:851f9b00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:851f9b00 r8:8027ed34 r7:eaf09e60 r6:851e9d80 r5:847e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf0dfb0 to 0xeaf0dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a57c80
INFO: task kworker/1:524:4424 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: c97f5000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:525:4426 blocked for more than 473 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:525 state:D stack:0 pid:4426 tgid:4426 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaf15d84 r8:00000002 r7:60000113 r6:eaf15d8c r5:84978c00
r4:84978c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84978c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf15e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85167040
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84978c00 r7:00000000 r6:83018200 r5:00001000 r4:7f091000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eace1000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8521738c r4:85217000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8521738c r4:851f9b80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84978c00 r8:851f9bac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:851f9b80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:851f9b80 r8:8027ed34 r7:eaf0de60 r6:851e9e00 r5:84978c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf15fb0 to 0xeaf15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a57f80
INFO: task kworker/1:525:4426 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: c9b2a000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:526:4428 blocked for more than 473 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:526 state:D stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaf1dd84 r8:00000002 r7:60000113 r6:eaf1dd8c r5:84978000
r4:84978000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84978000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf1de08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851675c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84978000 r7:00000000 r6:83018200 r5:00001000 r4:7f097000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ead29000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85217f8c r4:85217c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85217f8c r4:851f9c00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84978000 r8:851f9c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:851f9c00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:851f9c00 r8:8027ed34 r7:eaf15e60 r6:851e9e80 r5:84978000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf1dfb0 to 0xeaf1dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:851670c0
INFO: task kworker/1:526:4428 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: c9b2b000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:527:4430 blocked for more than 473 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:527 state:D stack:0 pid:4430 tgid:4430 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaf25d84 r8:00000002 r7:60000013 r6:eaf25d8c r5:8497b000
r4:8497b000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8497b000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf25e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85167300
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8497b000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ead07000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8521778c r4:85217400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8521778c r4:851f9c80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8497b000 r8:851f9cac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:851f9c80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:851f9c80 r8:8027ed34 r7:eaf1de60 r6:851e9f00 r5:8497b000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf25fb0 to 0xeaf25ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:851670c0
INFO: task kworker/1:527:4430 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: ca2d4000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:528:4432 blocked for more than 473 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:528 state:D stack:0 pid:4432 tgid:4432 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaf2dd84 r8:00000002 r7:60000113 r6:eaf2dd8c r5:8497a400
r4:8497a400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8497a400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf2de08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85167480
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8497a400 r7:00000000 r6:83018200 r5:00001000 r4:7f095000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ead11000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85217b8c r4:85217800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85217b8c r4:851f9d00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8497a400 r8:851f9d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:851f9d00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:851f9d00 r8:8027ed34 r7:eaf1de60 r6:851e9f80 r5:8497a400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf2dfb0 to 0xeaf2dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85167180
INFO: task kworker/1:528:4432 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: ca4b1000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:529:4435 blocked for more than 473 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:529 state:D stack:0 pid:4435 tgid:4435 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaf35d84 r8:00000002 r7:60000113 r6:eaf35d8c r5:8497c800
r4:8497c800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8497c800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf35e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85167b40
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8497c800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eadf7000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8521d38c r4:8521d000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8521d38c r4:851f9d80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8497c800 r8:851f9dac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:851f9d80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:851f9d80 r8:8027ed34 r7:eaf1de60 r6:850f8000 r5:8497c800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf35fb0 to 0xeaf35ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85167400
INFO: task kworker/1:529:4435 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: ca714000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:530:4436 blocked for more than 474 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:530 state:D stack:0 pid:4436 tgid:4436 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaf39d84 r8:00000002 r7:60000113 r6:eaf39d8c r5:8497d400
r4:8497d400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8497d400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf39e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85167700
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8497d400 r7:00000000 r6:83018200 r5:00001000 r4:7f099000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ead79000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8521c38c r4:8521c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8521c38c r4:851f9e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8497d400 r8:851f9e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:851f9e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:851f9e00 r8:8027ed34 r7:eaf35e60 r6:850f8080 r5:8497d400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf39fb0 to 0xeaf39ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85167400
INFO: task kworker/1:530:4436 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: cba42000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:531:4438 blocked for more than 474 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:531 state:D stack:0 pid:4438 tgid:4438 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaf41d84 r8:00000002 r7:60000113 r6:eaf41d8c r5:8497bc00
r4:8497bc00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8497bc00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf41e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851678c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8497bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eadd3000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8521cb8c r4:8521c800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8521cb8c r4:851f9e80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8497bc00 r8:851f9eac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:851f9e80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:851f9e80 r8:8027ed34 r7:eaf35e60 r6:850f8100 r5:8497bc00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf41fb0 to 0xeaf41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:851674c0
INFO: task kworker/1:531:4438 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: cc07a000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:131:4440 blocked for more than 474 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:131 state:D stack:0 pid:4440 tgid:4440 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaf3dd84 r8:00000002 r7:60000113 r6:eaf3dd8c r5:8497e000
r4:8497e000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8497e000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf3de08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850e6a80
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:8497e000 r7:00000000 r6:83018000 r5:00001000 r4:7f033000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e03ff000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85185f8c r4:85185c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:85185f8c r4:850f8180
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8497e000 r8:850f81ac r7:82804d40 r6:dddced40 r5:dddced60
r4:850f8180
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:850f8180 r8:8027ed34 r7:eae99e60 r6:850f8200 r5:8497e000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf3dfb0 to 0xeaf3dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:850e6000
INFO: task kworker/0:131:4440 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: cc182000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:532:4442 blocked for more than 474 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:532 state:D stack:0 pid:4442 tgid:4442 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaf4dd84 r8:00000002 r7:60000113 r6:eaf4dd8c r5:847e5400
r4:847e5400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:847e5400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf4de08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85167a00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:847e5400 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eade7000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8521cf8c r4:8521cc00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8521cf8c r4:851f9f00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:847e5400 r8:851f9f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:851f9f00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:851f9f00 r8:8027ed34 r7:eaf35e60 r6:850f8280 r5:847e5400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf4dfb0 to 0xeaf4dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85167740
INFO: task kworker/1:532:4442 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: ccfc3000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:533:4445 blocked for more than 474 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:533 state:D stack:0 pid:4445 tgid:4445 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaf59d84 r8:00000002 r7:60000013 r6:eaf59d8c r5:850f0c00
r4:850f0c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:850f0c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf59e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85167c80
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:850f0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaf5b000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8521d78c r4:8521d400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8521d78c r4:851f9f80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:850f0c00 r8:851f9fac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:851f9f80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:851f9f80 r8:8027ed34 r7:eaf35e60 r6:850f8300 r5:850f0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf59fb0 to 0xeaf59ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85167880
INFO: task kworker/1:533:4445 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: cd36b000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:534:4447 blocked for more than 474 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:534 state:D stack:0 pid:4447 tgid:4447 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaf6dd84 r8:00000002 r7:60000013 r6:eaf6dd8c r5:850f0000
r4:850f0000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:850f0000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf6de08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85167f00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:850f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaf7b000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8521df8c r4:8521dc00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8521df8c r4:850e1000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:850f0000 r8:850e102c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:850e1000
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:850e1000 r8:8027ed34 r7:eaf59e60 r6:850f8380 r5:850f0000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf6dfb0 to 0xeaf6dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85167b00
INFO: task kworker/1:534:4447 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: cdb43000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:535:4448 blocked for more than 474 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:535 state:D stack:0 pid:4448 tgid:4448 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaf71d84 r8:00000002 r7:60000113 r6:eaf71d8c r5:850f2400
r4:850f2400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:850f2400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf71e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85167b00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:850f2400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaf67000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8521db8c r4:8521d800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8521db8c r4:850e1080
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:850f2400 r8:850e10ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:850e1080
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:850e1080 r8:8027ed34 r7:eaf6de60 r6:850f8400 r5:850f2400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf71fb0 to 0xeaf71ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85167b00
INFO: task kworker/1:535:4448 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: cdda5000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:536:4450 blocked for more than 474 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:536 state:D stack:0 pid:4450 tgid:4450 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaf85d84 r8:00000002 r7:60000113 r6:eaf85d8c r5:850f1800
r4:850f1800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:850f1800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf85e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850fb4c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:850f1800 r7:00000000 r6:83018200 r5:00001000 r4:7f029000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa43000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8521f38c r4:8521f000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8521f38c r4:850e1100
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:850f1800 r8:850e112c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:850e1100
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:850e1100 r8:8027ed34 r7:eaf6de60 r6:850f8480 r5:850f1800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf85fb0 to 0xeaf85ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85167e40
INFO: task kworker/1:536:4450 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: ce1eb000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:537:4452 blocked for more than 474 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:537 state:D stack:0 pid:4452 tgid:4452 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaf95d84 r8:00000002 r7:60000013 r6:eaf95d8c r5:850f3000
r4:850f3000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:850f3000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf95e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846824c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:850f3000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaf8b000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8521e38c r4:8521e000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8521e38c r4:850e1180
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:850f3000 r8:850e11ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:850e1180
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:850e1180 r8:8027ed34 r7:eaf85e60 r6:850f8500 r5:850f3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf95fb0 to 0xeaf95ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84682f00
INFO: task kworker/1:537:4452 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: ce68a000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:538:4454 blocked for more than 475 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:538 state:D stack:0 pid:4454 tgid:4454 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eafa1d84 r8:00000002 r7:60000113 r6:eafa1d8c r5:850f4800
r4:850f4800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:850f4800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafa1e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a57e00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:850f4800 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaf97000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8521e78c r4:8521e400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8521e78c r4:850e1200
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:850f4800 r8:850e122c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:850e1200
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:850e1200 r8:8027ed34 r7:eaf85e60 r6:850f8580 r5:850f4800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeafa1fb0 to 0xeafa1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a57e80
INFO: task kworker/1:538:4454 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: cee1b000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:539:4456 blocked for more than 475 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:539 state:D stack:0 pid:4456 tgid:4456 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eafb1d84 r8:00000002 r7:60000013 r6:eafb1d8c r5:850f6000
r4:850f6000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:850f6000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafb1e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850fb0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:850f6000 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eafa7000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8521eb8c r4:8521e800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8521eb8c r4:850e1280
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:850f6000 r8:850e12ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:850e1280
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:850e1280 r8:8027ed34 r7:eaf85e60 r6:850f8600 r5:850f6000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeafb1fb0 to 0xeafb1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:850fb040
INFO: task kworker/1:539:4456 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: cf32b000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:540:4458 blocked for more than 475 seconds.
Call trace:
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae4de08
r4:00000000
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r10:00000000 r9:850e1300 r8:8027ed34 r7:eaf85e60 r6:850f8680 r5:850f5400
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
r4:00000000
5d60: 80000013 ffffffff
r4:dfe15dc0
r4:00000000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:541:4460 blocked for more than 475 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:541 state:D stack:0 pid:4460 tgid:4460 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eae6dd84 r8:00000002 r7:60000113 r6:eae6dd8c r5:850f6c00
r4:850f6c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:850f6c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae6de08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850fba80
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:850f6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f035000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0447000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8522038c r4:85220000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8522038c r4:850e1380
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:850f6c00 r8:850e13ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:850e1380
r10:00000000 r9:850e1380 r8:8027ed34 r7:eaf85e60 r6:850f8700 r5:850f6c00
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
r4:00000000
r5:00001000 r4:dfa81000
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:542:4462 blocked for more than 475 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:542 state:D stack:0 pid:4462 tgid:4462 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eafb9d84 r8:00000002 r7:60000113 r6:eafb9d8c r5:8497ec00
r4:8497ec00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8497ec00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafb9e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850fb5c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8497ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfb17000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8521f78c r4:8521f400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8521f78c r4:850e1400
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8497ec00 r8:850e142c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:850e1400
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:850e1400 r8:8027ed34 r7:eae6de60 r6:850f8780 r5:8497ec00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeafb9fb0 to 0xeafb9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:850fb200
INFO: task kworker/1:542:4462 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: cf7bb000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:543:4464 blocked for more than 475 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:543 state:D stack:0 pid:4464 tgid:4464 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eafc1d84 r8:00000002 r7:60000113 r6:eafc1d8c r5:850f3c00
r4:850f3c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:850f3c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafc1e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850fb740
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:850f3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcfd000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8521fb8c r4:8521f800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8521fb8c r4:850e1480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:850f3c00 r8:850e14ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:850e1480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:850e1480 r8:8027ed34 r7:eae6de60 r6:850f8800 r5:850f3c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeafc1fb0 to 0xeafc1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:850fb440
INFO: task kworker/1:543:4464 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: cf915000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:544:4466 blocked for more than 475 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:544 state:D stack:0 pid:4466 tgid:4466 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eafc9d84 r8:00000002 r7:60000113 r6:eafc9d8c r5:849d8c00
r4:849d8c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:849d8c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafc9e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850fb780
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849d8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfead000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8521ff8c r4:8521fc00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8521ff8c r4:850e1580
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849d8c00 r8:850e15ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:850e1580
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:850e1580 r8:8027ed34 r7:eae6de60 r6:850f8880 r5:849d8c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeafc9fb0 to 0xeafc9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:850fb800
INFO: task kworker/1:544:4466 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: cfd21000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
INFO: task kworker/1:545:4468 blocked for more than 475 seconds.
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac45e08
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850fbc80
r5:85220b8c r4:85220800
r4:850e1500
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:850fb840
INFO: task kworker/1:545:4468 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: d0129000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:132:4471 blocked for more than 475 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:132 state:D stack:0 pid:4471 tgid:4471 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eafc5d84 r8:00000002 r7:60000113 r6:eafc5d8c r5:849da400
r4:849da400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:849da400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
5d20: d0c0a000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:546:4473 blocked for more than 475 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:546 state:D stack:0 pid:4473 tgid:4473 ppid:2 task_flags:0x4208060 flags:0x00000000
r5:849dbc00 r4:829185c0
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafd1e08
r4:00000000
r5:8522078c r4:85220400
r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
INFO: task kworker/1:547:4476 blocked for more than 475 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:547 state:D stack:0 pid:4476 tgid:4476 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eafddd84 r8:00000002 r7:60000113 r6:eafddd8c r5:849dc800
r4:849dc800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:849dc800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafdde08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8515f480
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849dc800 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ea931000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85222b8c r4:85222800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
Workqueue: events bpf_prog_free_deferred
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeafe9fb0 to 0xeafe9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:850fbc40
INFO: task kworker/1:549:4479 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: d221f000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r4:84b3cc00
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Workqueue: events bpf_prog_free_deferred
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaff1e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850fbd40
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849de000 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e067d000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8522178c r4:85221400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8522178c r4:850e1800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849de000 r8:850e182c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:850e1800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:850e1800 r8:8027ed34 r7:eafdde60 r6:850f8c80 r5:849de000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaff1fb0 to 0xeaff1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:850fbfc0
INFO: task kworker/1:550:4481 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
r5:80000013 r4:80239bd0
r4:00000000
r5:00001000 r4:dfa81000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:551:4483 blocked for more than 475 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:551 state:D stack:0 pid:4483 tgid:4483 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb001d84 r8:00000002 r7:60000113 r6:eb001d8c r5:84979800
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb001e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
r4:00000000
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r10:00000000 r9:850e1880 r8:8027ed34 r7:eafdde60 r6:850f8d00 r5:84979800
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:552:4486 blocked for more than 475 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:552 state:D stack:0 pid:4486 tgid:4486 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb00dd84 r8:00000002 r7:60000113 r6:eb00dd8c r5:85250c00
r4:85250c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85250c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb00de08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84682b40
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85250c00 r7:00000000 r6:83018200 r5:00001000 r4:7f043000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e47a7000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85221f8c r4:85221c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85221f8c r4:850e1900
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85250c00 r8:850e192c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:850e1900
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:850e1900 r8:8027ed34 r7:eafdde60 r6:850f8d80 r5:85250c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb00dfb0 to 0xeb00dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84682d40
INFO: task kworker/1:552:4486 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: d2fbf000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:553:4487 blocked for more than 475 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:553 state:D stack:0 pid:4487 tgid:4487 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb011d84 r8:00000002 r7:60000113 r6:eb011d8c r5:85251800
r4:85251800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85251800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb011e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8515f140
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85251800 r7:00000000 r6:83018200 r5:00001000 r4:7f045000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e47f3000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8522238c r4:85222000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8522238c r4:850e1980
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85251800 r8:850e19ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:850e1980
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:850e1980 r8:8027ed34 r7:eafdde60 r6:850f8e00 r5:85251800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb011fb0 to 0xeb011ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84682d40
INFO: task kworker/1:553:4487 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: d320a000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Workqueue: events bpf_prog_free_deferred
r5:85250000 r4:829185c0
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb019e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8515f280
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85250000 r7:00000000 r6:83018200 r5:00001000 r4:7f047000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e884d000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8522278c r4:85222400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
r4:85253000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85186b8c r4:85186800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:85186b8c r4:850f8f00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85253000 r8:850f8f2c r7:82804d40 r6:dddced40 r5:dddced60
r4:850f8f00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:850f8f00 r8:8027ed34 r7:eae99e60 r6:850f8f80 r5:85253000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaef5fb0 to 0xeaef5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85174cc0
INFO: task kworker/0:133:4492 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
r4:82abf1e4
r4:dfe15dc0
r4:00000000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
INFO: task kworker/1:555:4494 blocked for more than 476 seconds.
Call trace:
r5:85253c00 r4:829185c0
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb021e08
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
r9:83018205 r8:85253c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000
r7:ddde2d40 r6:83018200 r5:8522338c r4:850e1a80
r10:00000000 r9:850e1a80 r8:8027ed34 r7:eafdde60 r6:85142000 r5:85253c00
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8515f100
INFO: task kworker/1:555:4494 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: d4120000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:556:4495 blocked for more than 476 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:556 state:D stack:0 pid:4495 tgid:4495 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb025d84 r8:00000002 r7:60000113 r6:eb025d8c r5:85254800
r4:85254800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85254800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb025e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8515f600
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85254800 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaa4b000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85222f8c r4:85222c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85222f8c r4:850e1b00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85254800 r8:850e1b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:850e1b00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:850e1b00 r8:8027ed34 r7:eb021e60 r6:85142080 r5:85254800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb025fb0 to 0xeb025ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8515f100
INFO: task kworker/1:556:4495 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: d4120000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:557:4498 blocked for more than 476 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:557 state:D stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb02dd84 r8:00000002 r7:60000113 r6:eb02dd8c r5:85256000
r4:85256000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85256000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb02de08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8515f840
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85256000 r7:00000000 r6:83018200 r5:00001000 r4:7f051000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eabf1000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8522378c r4:85223400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8522378c r4:850e1b80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85256000 r8:850e1bac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:850e1b80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:850e1b80 r8:8027ed34 r7:eb021e60 r6:85142100 r5:85256000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb02dfb0 to 0xeb02dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8515f500
INFO: task kworker/1:557:4498 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:82abf1e4
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r5:00001000 r4:dfa81000
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
r4:00000001
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
INFO: task kworker/1:558:4500 blocked for more than 476 seconds.
task:kworker/1:558 state:D stack:0 pid:4500 tgid:4500 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb035d84 r8:00000002 r7:60000113 r6:eb035d8c r5:85252400
r4:85252400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85252400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb035e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85275b80
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85252400 r7:00000000 r6:83018200 r5:00001000 r4:7f0c1000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb10b000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85227b8c r4:85227800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85227b8c r4:850e1c00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85252400 r8:850e1c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:850e1c00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:850e1c00 r8:8027ed34 r7:eb02de60 r6:85142180 r5:85252400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb035fb0 to 0xeb035ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8515f6c0
INFO: task kworker/1:558:4500 is blocked on a mutex likely owned by task kworker/0:51:3517.
Workqueue: events bpf_prog_free_deferred
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
r4:00000000
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:559 state:D stack:0 pid:4501 tgid:4501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb039d84 r8:00000002 r7:60000113 r6:eb039d8c r5:85255400
r4:85255400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85255400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb039e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8515f9c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85255400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eac15000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85223b8c r4:85223800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:00000000 r9:850e1c80 r8:8027ed34 r7:eb035e60 r6:85142200 r5:85255400
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: d4e4f000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:560:4503 blocked for more than 476 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:560 state:D stack:0 pid:4503 tgid:4503 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb045d84 r8:00000002 r7:60000113 r6:eb045d8c r5:849d8000
r4:849d8000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:849d8000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb045e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8515fa80
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849d8000 r7:00000000 r6:83018200 r5:00001000 r4:7f055000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaccb000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85223f8c r4:85223c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85223f8c r4:850e1d00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849d8000 r8:850e1d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:850e1d00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:850e1d00 r8:8027ed34 r7:eb035e60 r6:85142280 r5:849d8000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb045fb0 to 0xeb045ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8515f940
INFO: task kworker/1:560:4503 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: d51f5000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:561:4505 blocked for more than 476 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:561 state:D stack:0 pid:4505 tgid:4505 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb04dd84 r8:00000002 r7:60000113 r6:eb04dd8c r5:849dec00
r4:849dec00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:849dec00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb04de08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8515fc40
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849dec00 r7:00000000 r6:83018200 r5:00001000 r4:7f057000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ead8b000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8522438c r4:85224000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8522438c r4:850e1d80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849dec00 r8:850e1dac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:850e1d80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:850e1d80 r8:8027ed34 r7:eb035e60 r6:85142300 r5:849dec00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb04dfb0 to 0xeb04dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8515f940
INFO: task kworker/1:561:4505 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: d5783000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:562:4507 blocked for more than 476 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:562 state:D stack:0 pid:4507 tgid:4507 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb055d84 r8:00000002 r7:60000013 r6:eb055d8c r5:84960c00
r4:84960c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84960c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb055e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8515fd80
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84960c00 r7:00000000 r6:83018200 r5:00001000 r4:7f059000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eae17000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8522478c r4:85224400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8522478c r4:850e1e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84960c00 r8:850e1e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:850e1e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:850e1e00 r8:8027ed34 r7:eb035e60 r6:85142380 r5:84960c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb055fb0 to 0xeb055ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8515fac0
INFO: task kworker/1:562:4507 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: d5bcb000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:563:4509 blocked for more than 476 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:563 state:D stack:0 pid:4509 tgid:4509 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb061d84 r8:00000002 r7:60000013 r6:eb061d8c r5:84963000
r4:84963000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84963000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb061e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8515fe80
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84963000 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eae2b000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85224b8c r4:85224800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85224b8c r4:850e1e80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84963000 r8:850e1eac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:850e1e80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:850e1e80 r8:8027ed34 r7:eb035e60 r6:85142400 r5:84963000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb061fb0 to 0xeb061ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8515fc00
INFO: task kworker/1:563:4509 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: d6120000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:564:4511 blocked for more than 476 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:564 state:D stack:0 pid:4511 tgid:4511 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb065d84 r8:00000002 r7:60000113 r6:eb065d8c r5:84961800
r4:84961800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84961800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb065e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8515ff00
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84961800 r7:00000000 r6:83018200 r5:00001000 r4:7f087000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eae3b000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85224f8c r4:85224c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85224f8c r4:850e1f00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84961800 r8:850e1f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:850e1f00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:850e1f00 r8:8027ed34 r7:eb035e60 r6:85142480 r5:84961800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb065fb0 to 0xeb065ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8515ff80
INFO: task kworker/1:564:4511 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: d8a9c000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:565:4513 blocked for more than 476 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:565 state:D stack:0 pid:4513 tgid:4513 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb06dd84 r8:00000002 r7:60000113 r6:eb06dd8c r5:84962400
r4:84962400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84962400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb06de08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85174f80
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84962400 r7:00000000 r6:83018200 r5:00001000 r4:7f089000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eae53000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8522538c r4:85225000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8522538c r4:850e1f80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84962400 r8:850e1fac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:850e1f80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:850e1f80 r8:8027ed34 r7:eb035e60 r6:85142500 r5:84962400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb06dfb0 to 0xeb06dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8515fc80
INFO: task kworker/1:565:4513 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: d8c4e000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:566:4515 blocked for more than 476 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:566 state:D stack:0 pid:4515 tgid:4515 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb091d84 r8:00000002 r7:60000013 r6:eb091d8c r5:84960000
r4:84960000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84960000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb091e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8515f3c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84960000 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eae63000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8522578c r4:85225400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8522578c r4:8523f000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84960000 r8:8523f02c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8523f000
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8523f000 r8:8027ed34 r7:eb035e60 r6:85142580 r5:84960000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb091fb0 to 0xeb091ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8515fe00
INFO: task kworker/1:566:4515 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: d8c4e000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:567:4517 blocked for more than 476 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:567 state:D stack:0 pid:4517 tgid:4517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb099d84 r8:00000002 r7:60000013 r6:eb099d8c r5:84963c00
r4:84963c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84963c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb099e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85275040
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84963c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b1000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eae77000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85225b8c r4:85225800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85225b8c r4:8523f080
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84963c00 r8:8523f0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8523f080
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8523f080 r8:8027ed34 r7:eb035e60 r6:85142600 r5:84963c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb099fb0 to 0xeb099ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8515fe00
INFO: task kworker/1:567:4517 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: d9499000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:568:4519 blocked for more than 476 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:568 state:D stack:0 pid:4519 tgid:4519 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb0a1d84 r8:00000002 r7:60000113 r6:eb0a1d8c r5:84964800
r4:84964800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84964800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0a1e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85275280
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84964800 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaff3000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85225f8c r4:85225c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85225f8c r4:8523f100
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84964800 r8:8523f12c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8523f100
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8523f100 r8:8027ed34 r7:eb035e60 r6:85142680 r5:84964800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb0a1fb0 to 0xeb0a1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:852751c0
INFO: task kworker/1:568:4519 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: d958c000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:569:4521 blocked for more than 476 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:569 state:D stack:0 pid:4521 tgid:4521 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb0a9d84 r8:00000002 r7:60000113 r6:eb0a9d8c r5:84965400
r4:84965400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84965400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0a9e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85275100
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84965400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb0ab000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8522638c r4:85226000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8522638c r4:8523f180
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84965400 r8:8523f1ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8523f180
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8523f180 r8:8027ed34 r7:eb035e60 r6:85142700 r5:84965400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb0a9fb0 to 0xeb0a9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85275100
INFO: task kworker/1:569:4521 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: d958c000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:570:4523 blocked for more than 476 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:570 state:D stack:0 pid:4523 tgid:4523 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb0b9d84 r8:00000002 r7:60000013 r6:eb0b9d8c r5:84966000
r4:84966000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84966000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0b9e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852752c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84966000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb0bb000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8522678c r4:85226400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8522678c r4:8523f200
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84966000 r8:8523f22c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8523f200
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8523f200 r8:8027ed34 r7:eb035e60 r6:85142780 r5:84966000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb0b9fb0 to 0xeb0b9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:852752c0
INFO: task kworker/1:570:4523 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: d9748000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:571:4525 blocked for more than 476 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:571 state:D stack:0 pid:4525 tgid:4525 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb0d1d84 r8:00000002 r7:60000013 r6:eb0d1d8c r5:84966c00
r4:84966c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84966c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0d1e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85275680
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84966c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b9000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb0c7000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85226b8c r4:85226800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85226b8c r4:8523f280
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84966c00 r8:8523f2ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8523f280
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8523f280 r8:8027ed34 r7:eb035e60 r6:85142800 r5:84966c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb0d1fb0 to 0xeb0d1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:852753c0
INFO: task kworker/1:571:4525 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: d9af1000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:572:4527 blocked for more than 477 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:572 state:D stack:0 pid:4527 tgid:4527 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb0e1d84 r8:00000002 r7:60000113 r6:eb0e1d8c r5:85268c00
r4:85268c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85268c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0e1e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852757c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85268c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0bb000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb0d7000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85226f8c r4:85226c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85226f8c r4:8523f300
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85268c00 r8:8523f32c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8523f300
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8523f300 r8:8027ed34 r7:eb035e60 r6:85142880 r5:85268c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb0e1fb0 to 0xeb0e1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85275540
INFO: task kworker/1:572:4527 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: d9b68000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:573:4529 blocked for more than 477 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:573 state:D stack:0 pid:4529 tgid:4529 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb0e9d84 r8:00000002 r7:60000113 r6:eb0e9d8c r5:8526a400
r4:8526a400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8526a400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0e9e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85275900
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8526a400 r7:00000000 r6:83018200 r5:00001000 r4:7f0bd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb0eb000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8522738c r4:85227000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8522738c r4:8523f380
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8526a400 r8:8523f3ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8523f380
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8523f380 r8:8027ed34 r7:eb035e60 r6:85142900 r5:8526a400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb0e9fb0 to 0xeb0e9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85275640
INFO: task kworker/1:573:4529 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51 state:R running task stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85275780
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85269800 r7:00000000 r6:83018200 r5:00001000 r4:7f0bf000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb0fb000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8522778c r4:85227400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8522778c r4:8523f400
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85269800 r8:8523f42c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8523f400
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8523f400 r8:8027ed34 r7:eb035e60 r6:85142980 r5:85269800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb0f9fb0 to 0xeb0f9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85275780
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:575:4533 blocked for more than 477 seconds.
Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:575 state:D stack:0 pid:4533 tgid:4533 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb109d84 r8:00000002 r7:60000113 r6:eb109d8c r5:85268000
r4:85268000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85268000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb109e08
r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f3040
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85268000 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfbb7000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85228f8c r4:85228c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85228f8c r4:8523f480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85268000 r8:8523f4ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8523f480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8523f480 r8:8027ed34 r7:eb035e60 r6:85142a00 r5:85268000
r4:00000001
9fa0: 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: da2b5000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb11de08
r9:83018205 r8:8526b000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c3000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: da919000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free