INFO: task kworker/0:9:3829 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:9 state:D stack:0 pid:3829 tgid:3829 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6441c>] (__schedule) from [<81a653b0>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a6441c>] (__schedule) from [<81a653b0>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:eafedd84 r9:00000002 r8:60010113 r7:829171a0 r6:eafedd8c r5:83b52400 r4:83b52400 [<81a65384>] (schedule) from [<81a65798>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:83b52400 r4:8291719c [<81a65780>] (schedule_preempt_disabled) from [<81a68348>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65780>] (schedule_preempt_disabled) from [<81a68348>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67ff8>] (__mutex_lock.constprop.0) from [<81a68af0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafede08 r4:00000000 [<81a68adc>] (__mutex_lock_slowpath) from [<81a68b30>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68af4>] (mutex_lock) from [<804ea37c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858b3cc0 r4:00000000 [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:83b52400 r7:00000000 r6:83018400 r5:00001000 r4:7f276000 [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ead59000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84fc1b8c r4:859bf500 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:84fc1b8c r4:859bf500 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:83b52400 r8:859bf52c r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:859bf500 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:859bf500 r8:80278fec r7:eaed9e60 r6:8594e680 r5:83b52400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafedfb0 to 0xeafedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:8599dac0 INFO: task kworker/0:9:3829 is blocked on a mutex likely owned by task kworker/1:282:6189. task:kworker/1:282 state:R running task stack:0 pid:6189 tgid:6189 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6441c>] (__schedule) from [<81a657e4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:85bebc00 r8:80200c04 r7:ea669d54 r6:ffffffff r5:85bebc00 r4:00000000 [<81a657a4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea669d20 to 0xea669d68) 9d20: c2a71000 ec0c1000 00000001 80239bf8 7f00d000 00000001 82acb1c4 82aca5a0 9d40: 7f00d000 ec0c1000 8280c9b4 ea669d9c ea669da0 ea669d70 80230af0 80239c10 9d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea140>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9ebc>] (__purge_vmap_area_lazy) from [<804ea4f8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea669dc0 r5:ea669e08 r4:ea669dc0 [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858d7f40 r4:00000000 [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:85bebc00 r7:00000000 r6:83018600 r5:00001000 r4:7f250000 [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfd0b000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84e86f8c r4:85c78380 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84e86f8c r4:85c78380 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85bebc00 r8:85c783ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85c78380 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85c78380 r8:80278fec r7:ea629e60 r6:85c78d00 r5:85bebc00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea669fb0 to 0xea669ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:8584e440 INFO: task kworker/1:22:3866 blocked for more than 434 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:22 state:D stack:0 pid:3866 tgid:3866 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6441c>] (__schedule) from [<81a653b0>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a6441c>] (__schedule) from [<81a653b0>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:eb92dd84 r9:00000002 r8:60000013 r7:829171a0 r6:eb92dd8c r5:855fc800 r4:855fc800 [<81a65384>] (schedule) from [<81a65798>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:855fc800 r4:8291719c [<81a65780>] (schedule_preempt_disabled) from [<81a68348>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65780>] (schedule_preempt_disabled) from [<81a68348>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67ff8>] (__mutex_lock.constprop.0) from [<81a68af0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb92de08 r4:00000000 [<81a68adc>] (__mutex_lock_slowpath) from [<81a68b30>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68af4>] (mutex_lock) from [<804ea37c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84c7c0c0 r4:00000000 [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:855fc800 r7:00000000 r6:83018600 r5:00001000 r4:7f270000 [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:eac3f000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84c73b8c r4:85992580 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84c73b8c r4:85992580 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:855fc800 r8:859925ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85992580 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85992580 r8:80278fec r7:eaedde60 r6:85992680 r5:855fc800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb92dfb0 to 0xeb92dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:859a5800 INFO: task kworker/1:22:3866 is blocked on a mutex likely owned by task kworker/1:282:6189. task:kworker/1:282 state:R running task stack:0 pid:6189 tgid:6189 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6441c>] (__schedule) from [<81a657e4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:85bebc00 r8:80200c04 r7:ea669d54 r6:ffffffff r5:85bebc00 r4:00000000 [<81a657a4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea669d20 to 0xea669d68) 9d20: c2a71000 ec0c1000 00000001 80239bf8 7f00d000 00000001 82acb1c4 82aca5a0 9d40: 7f00d000 ec0c1000 8280c9b4 ea669d9c ea669da0 ea669d70 80230af0 80239c10 9d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea140>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9ebc>] (__purge_vmap_area_lazy) from [<804ea4f8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea669dc0 r5:ea669e08 r4:ea669dc0 [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858d7f40 r4:00000000 [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:85bebc00 r7:00000000 r6:83018600 r5:00001000 r4:7f250000 [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfd0b000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84e86f8c r4:85c78380 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84e86f8c r4:85c78380 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85bebc00 r8:85c783ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85c78380 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85c78380 r8:80278fec r7:ea629e60 r6:85c78d00 r5:85bebc00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea669fb0 to 0xea669ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:8584e440 INFO: task kworker/1:24:3874 blocked for more than 434 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:24 state:D stack:0 pid:3874 tgid:3874 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6441c>] (__schedule) from [<81a653b0>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a6441c>] (__schedule) from [<81a653b0>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:eb0a1d84 r9:00000002 r8:60000113 r7:829171a0 r6:eb0a1d8c r5:8549ec00 r4:8549ec00 [<81a65384>] (schedule) from [<81a65798>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:8549ec00 r4:8291719c [<81a65780>] (schedule_preempt_disabled) from [<81a68348>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65780>] (schedule_preempt_disabled) from [<81a68348>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67ff8>] (__mutex_lock.constprop.0) from [<81a68af0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0a1e08 r4:00000000 [<81a68adc>] (__mutex_lock_slowpath) from [<81a68b30>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68af4>] (mutex_lock) from [<804ea37c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8461f2c0 r4:00000000 [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:8549ec00 r7:00000000 r6:83018600 r5:00001000 r4:7f266000 [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea68f000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:857aab8c r4:85919780 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:857aab8c r4:85919780 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:8549ec00 r8:859197ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85919780 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85919780 r8:80278fec r7:eb92de60 r6:85919800 r5:8549ec00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0a1fb0 to 0xeb0a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:8590e840 INFO: task kworker/1:24:3874 is blocked on a mutex likely owned by task kworker/1:282:6189. task:kworker/1:282 state:R running task stack:0 pid:6189 tgid:6189 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6441c>] (__schedule) from [<81a657e4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:85bebc00 r8:80200c04 r7:ea669d54 r6:ffffffff r5:85bebc00 r4:00000000 [<81a657a4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea669d20 to 0xea669d68) 9d20: c2a71000 ec0c1000 00000001 80239bf8 7f00d000 00000001 82acb1c4 82aca5a0 9d40: 7f00d000 ec0c1000 8280c9b4 ea669d9c ea669da0 ea669d70 80230af0 80239c10 9d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea140>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9ebc>] (__purge_vmap_area_lazy) from [<804ea4f8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea669dc0 r5:ea669e08 r4:ea669dc0 [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858d7f40 r4:00000000 [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:85bebc00 r7:00000000 r6:83018600 r5:00001000 r4:7f250000 [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfd0b000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84e86f8c r4:85c78380 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84e86f8c r4:85c78380 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85bebc00 r8:85c783ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85c78380 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85c78380 r8:80278fec r7:ea629e60 r6:85c78d00 r5:85bebc00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea669fb0 to 0xea669ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:8584e440 INFO: task kworker/0:11:3899 blocked for more than 434 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:11 state:D stack:0 pid:3899 tgid:3899 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6441c>] (__schedule) from [<81a653b0>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a6441c>] (__schedule) from [<81a653b0>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:eb011d84 r9:00000002 r8:60000113 r7:829171a0 r6:eb011d8c r5:833b0c00 r4:833b0c00 [<81a65384>] (schedule) from [<81a65798>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:833b0c00 r4:8291719c [<81a65780>] (schedule_preempt_disabled) from [<81a68348>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65780>] (schedule_preempt_disabled) from [<81a68348>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67ff8>] (__mutex_lock.constprop.0) from [<81a68af0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb011e08 r4:00000000 [<81a68adc>] (__mutex_lock_slowpath) from [<81a68b30>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68af4>] (mutex_lock) from [<804ea37c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855318c0 r4:00000000 [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:833b0c00 r7:00000000 r6:83018400 r5:00001000 r4:7f26a000 [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea8fb000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84fc3b8c r4:859bb400 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:84fc3b8c r4:859bb400 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:833b0c00 r8:859bb42c r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:859bb400 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:859bb400 r8:80278fec r7:eb041e60 r6:859bb600 r5:833b0c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb011fb0 to 0xeb011ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85941440 INFO: task kworker/0:11:3899 is blocked on a mutex likely owned by task kworker/1:282:6189. task:kworker/1:282 state:R running task stack:0 pid:6189 tgid:6189 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6441c>] (__schedule) from [<81a657e4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:85bebc00 r8:80200c04 r7:ea669d54 r6:ffffffff r5:85bebc00 r4:00000000 [<81a657a4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea669d20 to 0xea669d68) 9d20: c2a71000 ec0c1000 00000001 80239bf8 7f00d000 00000001 82acb1c4 82aca5a0 9d40: 7f00d000 ec0c1000 8280c9b4 ea669d9c ea669da0 ea669d70 80230af0 80239c10 9d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea140>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9ebc>] (__purge_vmap_area_lazy) from [<804ea4f8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea669dc0 r5:ea669e08 r4:ea669dc0 [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858d7f40 r4:00000000 [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:85bebc00 r7:00000000 r6:83018600 r5:00001000 r4:7f250000 [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfd0b000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84e86f8c r4:85c78380 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84e86f8c r4:85c78380 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85bebc00 r8:85c783ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85c78380 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85c78380 r8:80278fec r7:ea629e60 r6:85c78d00 r5:85bebc00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea669fb0 to 0xea669ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:8584e440 INFO: task kworker/0:253:6289 blocked for more than 434 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:253 state:D stack:0 pid:6289 tgid:6289 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6441c>] (__schedule) from [<81a653b0>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a6441c>] (__schedule) from [<81a653b0>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ea49dd84 r9:00000002 r8:60000113 r7:829171a0 r6:ea49dd8c r5:85551800 r4:85551800 [<81a65384>] (schedule) from [<81a65798>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:85551800 r4:8291719c [<81a65780>] (schedule_preempt_disabled) from [<81a68348>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65780>] (schedule_preempt_disabled) from [<81a68348>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67ff8>] (__mutex_lock.constprop.0) from [<81a68af0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea49de08 r4:00000000 [<81a68adc>] (__mutex_lock_slowpath) from [<81a68b30>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68af4>] (mutex_lock) from [<804ea37c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858bab80 r4:00000000 [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:85551800 r7:00000000 r6:83018400 r5:00001000 r4:7f264000 [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea689000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84fc278c r4:8582fc00 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:84fc278c r4:8582fc00 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85551800 r8:8582fc2c r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:8582fc00 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8582fc00 r8:80278fec r7:ea55de60 r6:8582f780 r5:85551800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea49dfb0 to 0xea49dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85f57cc0 INFO: task kworker/0:253:6289 is blocked on a mutex likely owned by task kworker/1:282:6189. task:kworker/1:282 state:R running task stack:0 pid:6189 tgid:6189 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6441c>] (__schedule) from [<81a657e4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:85bebc00 r8:80200c04 r7:ea669d54 r6:ffffffff r5:85bebc00 r4:00000000 [<81a657a4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea669d20 to 0xea669d68) 9d20: c4a80000 ec0c1000 00000001 80239bf8 7f00d000 00000001 82acb1c4 82aca5a0 9d40: 7f00d000 ec0c1000 8280c9b4 ea669d9c ea669da0 ea669d70 80230af0 80239c10 9d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea140>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9ebc>] (__purge_vmap_area_lazy) from [<804ea4f8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea669dc0 r5:ea669e08 r4:ea669dc0 [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858d7f40 r4:00000000 [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:85bebc00 r7:00000000 r6:83018600 r5:00001000 r4:7f250000 [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfd0b000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84e86f8c r4:85c78380 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84e86f8c r4:85c78380 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85bebc00 r8:85c783ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85c78380 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85c78380 r8:80278fec r7:ea629e60 r6:85c78d00 r5:85bebc00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea669fb0 to 0xea669ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:8584e440 INFO: task kworker/0:254:6294 blocked for more than 437 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:254 state:D stack:0 pid:6294 tgid:6294 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6441c>] (__schedule) from [<81a653b0>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a6441c>] (__schedule) from [<81a653b0>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ea57dd84 r9:00000002 r8:60000113 r7:829171a0 r6:ea57dd8c r5:86071800 r4:86071800 [<81a65384>] (schedule) from [<81a65798>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:86071800 r4:8291719c [<81a65780>] (schedule_preempt_disabled) from [<81a68348>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65780>] (schedule_preempt_disabled) from [<81a68348>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67ff8>] (__mutex_lock.constprop.0) from [<81a68af0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea57de08 r4:00000000 [<81a68adc>] (__mutex_lock_slowpath) from [<81a68b30>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68af4>] (mutex_lock) from [<804ea37c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e3fe40 r4:00000000 [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:86071800 r7:00000000 r6:83018400 r5:00001000 r4:7f256000 [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea88b000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84e79b8c r4:8582f400 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:84e79b8c r4:8582f400 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:86071800 r8:8582f42c r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:8582f400 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8582f400 r8:80278fec r7:ea55de60 r6:85c75a00 r5:86071800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea57dfb0 to 0xea57dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85a865c0 INFO: task kworker/0:254:6294 is blocked on a mutex likely owned by task kworker/1:282:6189. task:kworker/1:282 state:R running task stack:0 pid:6189 tgid:6189 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6441c>] (__schedule) from [<81a657e4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:85bebc00 r8:80200c04 r7:ea669d54 r6:ffffffff r5:85bebc00 r4:00000000 [<81a657a4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea669d20 to 0xea669d68) 9d20: c4a80000 ec0c1000 00000001 80239bf8 7f00d000 00000001 82acb1c4 82aca5a0 9d40: 7f00d000 ec0c1000 8280c9b4 ea669d9c ea669da0 ea669d70 80230af0 80239c10 9d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea140>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9ebc>] (__purge_vmap_area_lazy) from [<804ea4f8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea669dc0 r5:ea669e08 r4:ea669dc0 [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858d7f40 r4:00000000 [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:85bebc00 r7:00000000 r6:83018600 r5:00001000 r4:7f250000 [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfd0b000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84e86f8c r4:85c78380 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84e86f8c r4:85c78380 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85bebc00 r8:85c783ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85c78380 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85c78380 r8:80278fec r7:ea629e60 r6:85c78d00 r5:85bebc00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea669fb0 to 0xea669ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:8584e440 INFO: task kworker/0:255:6302 blocked for more than 437 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:255 state:D stack:0 pid:6302 tgid:6302 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6441c>] (__schedule) from [<81a653b0>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a6441c>] (__schedule) from [<81a653b0>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ea6b5d84 r9:00000002 r8:60000113 r7:829171a0 r6:ea6b5d8c r5:85554800 r4:85554800 [<81a65384>] (schedule) from [<81a65798>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:85554800 r4:8291719c [<81a65780>] (schedule_preempt_disabled) from [<81a68348>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65780>] (schedule_preempt_disabled) from [<81a68348>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67ff8>] (__mutex_lock.constprop.0) from [<81a68af0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea6b5e08 r4:00000000 [<81a68adc>] (__mutex_lock_slowpath) from [<81a68b30>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68af4>] (mutex_lock) from [<804ea37c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859a1f00 r4:00000000 [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:85554800 r7:00000000 r6:83018400 r5:00001000 r4:7f258000 [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:e00b2000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84e84b8c r4:8592eb00 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:84e84b8c r4:8592eb00 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85554800 r8:8592eb2c r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:8592eb00 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8592eb00 r8:80278fec r7:ea49de60 r6:8592e580 r5:85554800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea6b5fb0 to 0xea6b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:858e9080 INFO: task kworker/0:255:6302 is blocked on a mutex likely owned by task kworker/1:282:6189. task:kworker/1:282 state:R running task stack:0 pid:6189 tgid:6189 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6441c>] (__schedule) from [<81a657e4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:85bebc00 r8:80200c04 r7:ea669d54 r6:ffffffff r5:85bebc00 r4:00000000 [<81a657a4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea669d20 to 0xea669d68) 9d20: c4b0d000 ec0c1000 00000001 80239bf8 7f00d000 00000001 82acb1c4 82aca5a0 9d40: 7f00d000 ec0c1000 8280c9b4 ea669d9c ea669da0 ea669d70 80230af0 80239c10 9d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea140>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9ebc>] (__purge_vmap_area_lazy) from [<804ea4f8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea669dc0 r5:ea669e08 r4:ea669dc0 [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858d7f40 r4:00000000 [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:85bebc00 r7:00000000 r6:83018600 r5:00001000 r4:7f250000 [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfd0b000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84e86f8c r4:85c78380 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84e86f8c r4:85c78380 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85bebc00 r8:85c783ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85c78380 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85c78380 r8:80278fec r7:ea629e60 r6:85c78d00 r5:85bebc00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea669fb0 to 0xea669ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:8584e440 INFO: task kworker/0:256:6303 blocked for more than 440 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:256 state:D stack:0 pid:6303 tgid:6303 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6441c>] (__schedule) from [<81a653b0>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a6441c>] (__schedule) from [<81a653b0>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ea6bdd84 r9:00000002 r8:60000113 r7:829171a0 r6:ea6bdd8c r5:86073000 r4:86073000 [<81a65384>] (schedule) from [<81a65798>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:86073000 r4:8291719c [<81a65780>] (schedule_preempt_disabled) from [<81a68348>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65780>] (schedule_preempt_disabled) from [<81a68348>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67ff8>] (__mutex_lock.constprop.0) from [<81a68af0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea6bde08 r4:00000000 [<81a68adc>] (__mutex_lock_slowpath) from [<81a68b30>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68af4>] (mutex_lock) from [<804ea37c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858bacc0 r4:00000000 [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:86073000 r7:00000000 r6:83018400 r5:00001000 r4:7f24e000 [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfbe7000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:857ab78c r4:8592e900 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:857ab78c r4:8592e900 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:86073000 r8:8592e92c r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:8592e900 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8592e900 r8:80278fec r7:ea6b5e60 r6:85c75600 r5:86073000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea6bdfb0 to 0xea6bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85bd3e00 INFO: task kworker/0:256:6303 is blocked on a mutex likely owned by task kworker/1:282:6189. task:kworker/1:282 state:R running task stack:0 pid:6189 tgid:6189 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6441c>] (__schedule) from [<81a657e4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:85bebc00 r8:80200c04 r7:ea669d54 r6:ffffffff r5:85bebc00 r4:00000000 [<81a657a4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea669d20 to 0xea669d68) 9d20: c5fd9000 ec0c1000 00000001 80239bf8 7f00d000 00000001 82acb1c4 82aca5a0 9d40: 7f00d000 ec0c1000 8280c9b4 ea669d9c ea669da0 ea669d70 80230af0 80239c10 9d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea140>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9ebc>] (__purge_vmap_area_lazy) from [<804ea4f8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea669dc0 r5:ea669e08 r4:ea669dc0 [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858d7f40 r4:00000000 [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:85bebc00 r7:00000000 r6:83018600 r5:00001000 r4:7f250000 [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfd0b000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84e86f8c r4:85c78380 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84e86f8c r4:85c78380 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85bebc00 r8:85c783ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85c78380 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85c78380 r8:80278fec r7:ea629e60 r6:85c78d00 r5:85bebc00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea669fb0 to 0xea669ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:8584e440 INFO: task kworker/1:286:6306 blocked for more than 440 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:286 state:D stack:0 pid:6306 tgid:6306 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6441c>] (__schedule) from [<81a653b0>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a6441c>] (__schedule) from [<81a653b0>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ea6a5d84 r9:00000002 r8:60000113 r7:829171a0 r6:ea6a5d8c r5:85553c00 r4:85553c00 [<81a65384>] (schedule) from [<81a65798>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:85553c00 r4:8291719c [<81a65780>] (schedule_preempt_disabled) from [<81a68348>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65780>] (schedule_preempt_disabled) from [<81a68348>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67ff8>] (__mutex_lock.constprop.0) from [<81a68af0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea6a5e08 r4:00000000 [<81a68adc>] (__mutex_lock_slowpath) from [<81a68b30>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68af4>] (mutex_lock) from [<804ea37c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858b3c40 r4:00000000 [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:85553c00 r7:00000000 r6:83018600 r5:00001000 r4:7f278000 [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ead53000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84fc1f8c r4:85c75700 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84fc1f8c r4:85c75700 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85553c00 r8:85c7572c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85c75700 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85c75700 r8:80278fec r7:eb92de60 r6:8592ee00 r5:85553c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea6a5fb0 to 0xea6a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85a91c80 INFO: task kworker/1:286:6306 is blocked on a mutex likely owned by task kworker/1:282:6189. task:kworker/1:282 state:R running task stack:0 pid:6189 tgid:6189 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6441c>] (__schedule) from [<81a657e4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:85bebc00 r8:80200c04 r7:ea669d54 r6:ffffffff r5:85bebc00 r4:00000000 [<81a657a4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea669d20 to 0xea669d68) 9d20: c5fdb000 ec0c1000 00000001 80239bf8 7f00d000 00000001 82acb1c4 82aca5a0 9d40: 7f00d000 ec0c1000 8280c9b4 ea669d9c ea669da0 ea669d70 80230af0 80239c10 9d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea140>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9ebc>] (__purge_vmap_area_lazy) from [<804ea4f8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea669dc0 r5:ea669e08 r4:ea669dc0 [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858d7f40 r4:00000000 [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:85bebc00 r7:00000000 r6:83018600 r5:00001000 r4:7f250000 [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfd0b000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84e86f8c r4:85c78380 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84e86f8c r4:85c78380 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85bebc00 r8:85c783ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85c78380 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85c78380 r8:80278fec r7:ea629e60 r6:85c78d00 r5:85bebc00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea669fb0 to 0xea669ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:8584e440 INFO: task kworker/1:288:6311 blocked for more than 441 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:288 state:D stack:0 pid:6311 tgid:6311 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6441c>] (__schedule) from [<81a653b0>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a6441c>] (__schedule) from [<81a653b0>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ea6c5d84 r9:00000002 r8:60000113 r7:829171a0 r6:ea6c5d8c r5:85556c00 r4:85556c00 [<81a65384>] (schedule) from [<81a65798>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:85556c00 r4:8291719c [<81a65780>] (schedule_preempt_disabled) from [<81a68348>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65780>] (schedule_preempt_disabled) from [<81a68348>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67ff8>] (__mutex_lock.constprop.0) from [<81a68af0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea6c5e08 r4:00000000 [<81a68adc>] (__mutex_lock_slowpath) from [<81a68b30>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68af4>] (mutex_lock) from [<804ea37c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:830b6080 r4:00000000 [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:85556c00 r7:00000000 r6:83018600 r5:00001000 r4:7f26e000 [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:eab01000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84aab38c r4:85c75c80 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84aab38c r4:85c75c80 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85556c00 r8:85c75cac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85c75c80 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85c75c80 r8:80278fec r7:eb92de60 r6:85ec6480 r5:85556c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea6c5fb0 to 0xea6c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:84fd9e40 INFO: task kworker/1:288:6311 is blocked on a mutex likely owned by task kworker/1:282:6189. task:kworker/1:282 state:R running task stack:0 pid:6189 tgid:6189 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6441c>] (__schedule) from [<81a657e4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:85bebc00 r8:80200c04 r7:ea669d54 r6:ffffffff r5:85bebc00 r4:00000000 [<81a657a4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea669d20 to 0xea669d68) 9d20: c5fdc000 ec0c1000 00000001 80239bf8 7f00d000 00000001 82acb1c4 82aca5a0 9d40: 7f00d000 ec0c1000 8280c9b4 ea669d9c ea669da0 ea669d70 80230af0 80239c10 9d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea140>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9ebc>] (__purge_vmap_area_lazy) from [<804ea4f8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea669dc0 r5:ea669e08 r4:ea669dc0 [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858d7f40 r4:00000000 [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:85bebc00 r7:00000000 r6:83018600 r5:00001000 r4:7f250000 [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfd0b000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84e86f8c r4:85c78380 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84e86f8c r4:85c78380 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85bebc00 r8:85c783ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85c78380 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85c78380 r8:80278fec r7:ea629e60 r6:85c78d00 r5:85bebc00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea669fb0 to 0xea669ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:8584e440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:289:6314 blocked for more than 444 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:289 state:D stack:0 pid:6314 tgid:6314 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6441c>] (__schedule) from [<81a653b0>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a6441c>] (__schedule) from [<81a653b0>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ea6c9d84 r9:00000002 r8:60000113 r7:829171a0 r6:ea6c9d8c r5:85553000 r4:85553000 [<81a65384>] (schedule) from [<81a65798>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:85553000 r4:8291719c [<81a65780>] (schedule_preempt_disabled) from [<81a68348>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65780>] (schedule_preempt_disabled) from [<81a68348>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67ff8>] (__mutex_lock.constprop.0) from [<81a68af0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea6c9e08 r4:00000000 [<81a68adc>] (__mutex_lock_slowpath) from [<81a68b30>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68af4>] (mutex_lock) from [<804ea37c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e3fe00 r4:00000000 [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:85553000 r7:00000000 r6:83018600 r5:00001000 r4:7f268000 [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea8ed000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84e8638c r4:85c75d80 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84e8638c r4:85c75d80 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85553000 r8:85c75dac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85c75d80 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85c75d80 r8:80278fec r7:eb92de60 r6:85ec6c00 r5:85553000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea6c9fb0 to 0xea6c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:84fd94c0 INFO: task kworker/1:289:6314 is blocked on a mutex likely owned by task kworker/1:282:6189. task:kworker/1:282 state:R running task stack:0 pid:6189 tgid:6189 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6441c>] (__schedule) from [<81a657e4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:85bebc00 r8:80200c04 r7:ea669d54 r6:ffffffff r5:85bebc00 r4:00000000 [<81a657a4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea669d20 to 0xea669d68) 9d20: c5fdc000 ec0c1000 00000001 80239bf8 7f00d000 00000001 82acb1c4 82aca5a0 9d40: 7f00d000 ec0c1000 8280c9b4 ea669d9c ea669da0 ea669d70 80230af0 80239c10 9d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea140>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9ebc>] (__purge_vmap_area_lazy) from [<804ea4f8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea669dc0 r5:ea669e08 r4:ea669dc0 [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858d7f40 r4:00000000 [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:85bebc00 r7:00000000 r6:83018600 r5:00001000 r4:7f250000 [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfd0b000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84e86f8c r4:85c78380 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84e86f8c r4:85c78380 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85bebc00 r8:85c783ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85c78380 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85c78380 r8:80278fec r7:ea629e60 r6:85c78d00 r5:85bebc00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea669fb0 to 0xea669ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:8584e440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:290:6315 blocked for more than 445 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:290 state:D stack:0 pid:6315 tgid:6315 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6441c>] (__schedule) from [<81a653b0>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a6441c>] (__schedule) from [<81a653b0>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ea6cdd84 r9:00000002 r8:60000013 r7:829171a0 r6:ea6cdd8c r5:85550c00 r4:85550c00 [<81a65384>] (schedule) from [<81a65798>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:85550c00 r4:8291719c [<81a65780>] (schedule_preempt_disabled) from [<81a68348>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65780>] (schedule_preempt_disabled) from [<81a68348>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67ff8>] (__mutex_lock.constprop.0) from [<81a68af0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea6cde08 r4:00000000 [<81a68adc>] (__mutex_lock_slowpath) from [<81a68b30>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68af4>] (mutex_lock) from [<804ea37c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d43580 r4:00000000 [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:85550c00 r7:00000000 r6:83018600 r5:00001000 r4:7f272000 [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:eac55000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85ffe78c r4:85c75b80 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:85ffe78c r4:85c75b80 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85550c00 r8:85c75bac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85c75b80 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85c75b80 r8:80278fec r7:ea6c9e60 r6:85ec6400 r5:85550c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea6cdfb0 to 0xea6cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:84fd9400 INFO: task kworker/1:290:6315 is blocked on a mutex likely owned by task kworker/1:282:6189. task:kworker/1:282 state:R running task stack:0 pid:6189 tgid:6189 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6441c>] (__schedule) from [<81a657e4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:85bebc00 r8:80200c04 r7:ea669d54 r6:ffffffff r5:85bebc00 r4:00000000 [<81a657a4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea669d20 to 0xea669d68) 9d20: c6106000 ec0c1000 00000001 80239bf8 7f00d000 00000001 82acb1c4 82aca5a0 9d40: 7f00d000 ec0c1000 8280c9b4 ea669d9c ea669da0 ea669d70 80230af0 80239c10 9d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea140>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9ebc>] (__purge_vmap_area_lazy) from [<804ea4f8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea669dc0 r5:ea669e08 r4:ea669dc0 [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858d7f40 r4:00000000 [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:85bebc00 r7:00000000 r6:83018600 r5:00001000 r4:7f250000 [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfd0b000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84e86f8c r4:85c78380 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84e86f8c r4:85c78380 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85bebc00 r8:85c783ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85c78380 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85c78380 r8:80278fec r7:ea629e60 r6:85c78d00 r5:85bebc00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea669fb0 to 0xea669ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:8584e440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:291:6318 blocked for more than 447 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:291 state:D stack:0 pid:6318 tgid:6318 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6441c>] (__schedule) from [<81a653b0>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a6441c>] (__schedule) from [<81a653b0>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ea6d1d84 r9:00000002 r8:60000113 r7:829171a0 r6:ea6d1d8c r5:85552400 r4:85552400 [<81a65384>] (schedule) from [<81a65798>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:85552400 r4:8291719c [<81a65780>] (schedule_preempt_disabled) from [<81a68348>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65780>] (schedule_preempt_disabled) from [<81a68348>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67ff8>] (__mutex_lock.constprop.0) from [<81a68af0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea6d1e08 r4:00000000 [<81a68adc>] (__mutex_lock_slowpath) from [<81a68b30>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68af4>] (mutex_lock) from [<804ea37c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a91e80 r4:00000000 [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:85552400 r7:00000000 r6:83018600 r5:00001000 r4:7f26c000 [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:eaa55000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84fc3f8c r4:85c75280 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84fc3f8c r4:85c75280 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85552400 r8:85c752ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85c75280 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85c75280 r8:80278fec r7:ea6c9e60 r6:85ec6980 r5:85552400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea6d1fb0 to 0xea6d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:859e0840 INFO: task kworker/1:291:6318 is blocked on a mutex likely owned by task kworker/1:282:6189. task:kworker/1:282 state:R running task stack:0 pid:6189 tgid:6189 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6441c>] (__schedule) from [<81a657e4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:85bebc00 r8:80200c04 r7:ea669d54 r6:ffffffff r5:85bebc00 r4:00000000 [<81a657a4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea669d20 to 0xea669d68) 9d20: c8460000 ec0c1000 00000001 80239bf8 7f00d000 00000001 82acb1c4 82aca5a0 9d40: 7f00d000 ec0c1000 8280c9b4 ea669d9c ea669da0 ea669d70 80230af0 80239c10 9d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea140>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9ebc>] (__purge_vmap_area_lazy) from [<804ea4f8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea669dc0 r5:ea669e08 r4:ea669dc0 [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858d7f40 r4:00000000 [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:85bebc00 r7:00000000 r6:83018600 r5:00001000 r4:7f250000 [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfd0b000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84e86f8c r4:85c78380 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84e86f8c r4:85c78380 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85bebc00 r8:85c783ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85c78380 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85c78380 r8:80278fec r7:ea629e60 r6:85c78d00 r5:85bebc00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea669fb0 to 0xea669ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:8584e440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:292:6319 blocked for more than 449 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:292 state:D stack:0 pid:6319 tgid:6319 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6441c>] (__schedule) from [<81a653b0>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a6441c>] (__schedule) from [<81a653b0>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ea6d5d84 r9:00000002 r8:60000113 r7:829171a0 r6:ea6d5d8c r5:85550000 r4:85550000 [<81a65384>] (schedule) from [<81a65798>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:85550000 r4:8291719c [<81a65780>] (schedule_preempt_disabled) from [<81a68348>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65780>] (schedule_preempt_disabled) from [<81a68348>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67ff8>] (__mutex_lock.constprop.0) from [<81a68af0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea6d5e08 r4:00000000 [<81a68adc>] (__mutex_lock_slowpath) from [<81a68b30>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68af4>] (mutex_lock) from [<804ea37c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858ce340 r4:00000000 [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:85550000 r7:00000000 r6:83018600 r5:00001000 r4:7f250000 [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfc76000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:857a838c r4:85c75300 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:857a838c r4:85c75300 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85550000 r8:85c7532c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85c75300 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85c75300 r8:80278fec r7:ea6d1e60 r6:85ec6680 r5:85550000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea6d5fb0 to 0xea6d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85bc20c0 INFO: task kworker/1:292:6319 is blocked on a mutex likely owned by task kworker/1:282:6189. task:kworker/1:282 state:R running task stack:0 pid:6189 tgid:6189 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6441c>] (__schedule) from [<81a657e4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:85bebc00 r8:80200c04 r7:ea669d54 r6:ffffffff r5:85bebc00 r4:00000000 [<81a657a4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea669d20 to 0xea669d68) 9d20: c8460000 ec0c1000 00000001 80239bf8 7f00d000 00000001 82acb1c4 82aca5a0 9d40: 7f00d000 ec0c1000 8280c9b4 ea669d9c ea669da0 ea669d70 80230af0 80239c10 9d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea140>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9ebc>] (__purge_vmap_area_lazy) from [<804ea4f8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea669dc0 r5:ea669e08 r4:ea669dc0 [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858d7f40 r4:00000000 [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:85bebc00 r7:00000000 r6:83018600 r5:00001000 r4:7f250000 [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfd0b000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84e86f8c r4:85c78380 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84e86f8c r4:85c78380 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85bebc00 r8:85c783ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85c78380 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85c78380 r8:80278fec r7:ea629e60 r6:85c78d00 r5:85bebc00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea669fb0 to 0xea669ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:8584e440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:293:6322 blocked for more than 449 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:293 state:D stack:0 pid:6322 tgid:6322 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6441c>] (__schedule) from [<81a653b0>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a6441c>] (__schedule) from [<81a653b0>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ea6ddd84 r9:00000002 r8:60000113 r7:829171a0 r6:ea6ddd8c r5:85556000 r4:85556000 [<81a65384>] (schedule) from [<81a65798>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:85556000 r4:8291719c [<81a65780>] (schedule_preempt_disabled) from [<81a68348>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65780>] (schedule_preempt_disabled) from [<81a68348>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67ff8>] (__mutex_lock.constprop.0) from [<81a68af0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea6dde08 r4:00000000 [<81a68adc>] (__mutex_lock_slowpath) from [<81a68b30>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68af4>] (mutex_lock) from [<804ea37c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85851b40 r4:00000000 [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:85556000 r7:00000000 r6:83018600 r5:00001000 r4:7f25a000 [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:e0115000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84e78b8c r4:8582f800 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84e78b8c r4:8582f800 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85556000 r8:8582f82c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:8582f800 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8582f800 r8:80278fec r7:ea6d1e60 r6:85ec6300 r5:85556000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea6ddfb0 to 0xea6ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85f54d40 INFO: task kworker/1:293:6322 is blocked on a mutex likely owned by task kworker/1:282:6189. task:kworker/1:282 state:R running task stack:0 pid:6189 tgid:6189 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6441c>] (__schedule) from [<81a657e4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:85bebc00 r8:80200c04 r7:ea669d54 r6:ffffffff r5:85bebc00 r4:00000000 [<81a657a4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea669d20 to 0xea669d68) 9d20: c8628000 ec0c1000 00000001 80239bf8 7f00d000 00000001 82acb1c4 82aca5a0 9d40: 7f00d000 ec0c1000 8280c9b4 ea669d9c ea669da0 ea669d70 80230af0 80239c10 9d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea140>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9ebc>] (__purge_vmap_area_lazy) from [<804ea4f8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea669dc0 r5:ea669e08 r4:ea669dc0 [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858d7f40 r4:00000000 [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:85bebc00 r7:00000000 r6:83018600 r5:00001000 r4:7f250000 [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfd0b000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84e86f8c r4:85c78380 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84e86f8c r4:85c78380 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85bebc00 r8:85c783ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85c78380 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85c78380 r8:80278fec r7:ea629e60 r6:85c78d00 r5:85bebc00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea669fb0 to 0xea669ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:8584e440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:294:6325 blocked for more than 451 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:294 state:D stack:0 pid:6325 tgid:6325 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6441c>] (__schedule) from [<81a653b0>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a6441c>] (__schedule) from [<81a653b0>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ea6d9d84 r9:00000002 r8:60000113 r7:829171a0 r6:ea6d9d8c r5:86076000 r4:86076000 [<81a65384>] (schedule) from [<81a65798>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:86076000 r4:8291719c [<81a65780>] (schedule_preempt_disabled) from [<81a68348>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65780>] (schedule_preempt_disabled) from [<81a68348>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67ff8>] (__mutex_lock.constprop.0) from [<81a68af0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea6d9e08 r4:00000000 [<81a68adc>] (__mutex_lock_slowpath) from [<81a68b30>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68af4>] (mutex_lock) from [<804ea37c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a9bb80 r4:00000000 [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:86076000 r7:00000000 r6:83018600 r5:00001000 r4:7f254000 [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfabb000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:857a978c r4:8582fe80 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:857a978c r4:8582fe80 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:86076000 r8:8582feac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:8582fe80 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8582fe80 r8:80278fec r7:ea6dde60 r6:8582f080 r5:86076000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea6d9fb0 to 0xea6d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85f54d40 INFO: task kworker/1:294:6325 is blocked on a mutex likely owned by task kworker/1:282:6189. task:kworker/1:282 state:R running task stack:0 pid:6189 tgid:6189 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6441c>] (__schedule) from [<81a657e4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:85bebc00 r8:80200c04 r7:ea669d54 r6:ffffffff r5:85bebc00 r4:00000000 [<81a657a4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea669d20 to 0xea669d68) 9d20: ca730000 ec0c1000 00000001 80239bf8 7f00d000 00000001 82acb1c4 82aca5a0 9d40: 7f00d000 ec0c1000 8280c9b4 ea669d9c ea669da0 ea669d70 80230af0 80239c10 9d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea140>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9ebc>] (__purge_vmap_area_lazy) from [<804ea4f8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea669dc0 r5:ea669e08 r4:ea669dc0 [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858d7f40 r4:00000000 [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:85bebc00 r7:00000000 r6:83018600 r5:00001000 r4:7f250000 [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfd0b000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84e86f8c r4:85c78380 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84e86f8c r4:85c78380 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85bebc00 r8:85c783ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85c78380 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85c78380 r8:80278fec r7:ea629e60 r6:85c78d00 r5:85bebc00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea669fb0 to 0xea669ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:8584e440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:258:6334 blocked for more than 454 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:258 state:D stack:0 pid:6334 tgid:6334 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6441c>] (__schedule) from [<81a653b0>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a6441c>] (__schedule) from [<81a653b0>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ea6e5d84 r9:00000002 r8:600e0113 r7:829171a0 r6:ea6e5d8c r5:855bbc00 r4:855bbc00 [<81a65384>] (schedule) from [<81a65798>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:855bbc00 r4:8291719c [<81a65780>] (schedule_preempt_disabled) from [<81a68348>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65780>] (schedule_preempt_disabled) from [<81a68348>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67ff8>] (__mutex_lock.constprop.0) from [<81a68af0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea6e5e08 r4:00000000 [<81a68adc>] (__mutex_lock_slowpath) from [<81a68b30>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68af4>] (mutex_lock) from [<804ea37c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cb65c0 r4:00000000 [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:855bbc00 r7:00000000 r6:83018400 r5:00001000 r4:7f252000 [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:df9ef000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:857a938c r4:85d2cd00 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:857a938c r4:85d2cd00 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:855bbc00 r8:85d2cd2c r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:85d2cd00 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85d2cd00 r8:80278fec r7:ea6a1e60 r6:85d2c080 r5:855bbc00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea6e5fb0 to 0xea6e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85ab0b40 INFO: task kworker/0:258:6334 is blocked on a mutex likely owned by task kworker/1:282:6189. task:kworker/1:282 state:R running task stack:0 pid:6189 tgid:6189 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6441c>] (__schedule) from [<81a657e4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:85bebc00 r8:80200c04 r7:ea669d54 r6:ffffffff r5:85bebc00 r4:00000000 [<81a657a4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea669d20 to 0xea669d68) 9d20: cb4b4000 ec0c1000 00000001 80239bf8 7f00d000 00000001 82acb1c4 82aca5a0 9d40: 7f00d000 ec0c1000 8280c9b4 ea669d9c ea669da0 ea669d70 80230af0 80239c10 9d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea140>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9ebc>] (__purge_vmap_area_lazy) from [<804ea4f8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea669dc0 r5:ea669e08 r4:ea669dc0 [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858d7f40 r4:00000000 [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:85bebc00 r7:00000000 r6:83018600 r5:00001000 r4:7f250000