INFO: task kworker/1:120:4663 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:120 state:D stack:0 pid:4663 tgid:4663 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6391c>] (__schedule) from [<81a648b0>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a6391c>] (__schedule) from [<81a648b0>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ea5a5d84 r9:00000002 r8:60000113 r7:829171a0 r6:ea5a5d8c r5:85a36000 r4:85a36000 [<81a64884>] (schedule) from [<81a64c98>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:85a36000 r4:8291719c [<81a64c80>] (schedule_preempt_disabled) from [<81a67848>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64c80>] (schedule_preempt_disabled) from [<81a67848>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a674f8>] (__mutex_lock.constprop.0) from [<81a67ff0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea5a5e08 r4:00000000 [<81a67fdc>] (__mutex_lock_slowpath) from [<81a68030>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a67ff4>] (mutex_lock) from [<804ea354>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8548e940 r4:00000000 [<804edfc8>] (vfree) from [<80559050>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:85a36000 r7:00000000 r6:83018600 r5:00001000 r4:7f06b000 [<80559020>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:eae59000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85eb638c r4:85b0f800 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:85eb638c r4:85b0f800 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85a36000 r8:85b0f82c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85b0f800 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85b0f800 r8:80278fec r7:ea3ede60 r6:85985b80 r5:85a36000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea5a5fb0 to 0xea5a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:84be6e00 INFO: task kworker/1:120:4663 is blocked on a mutex likely owned by task kworker/1:179:4790. task:kworker/1:179 state:R running task stack:0 pid:4790 tgid:4790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6391c>] (__schedule) from [<81a64ce4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:85c68c00 r8:80200c04 r7:ea805d54 r6:ffffffff r5:85c68c00 r4:00000000 [<81a64ca4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea805d20 to 0xea805d68) 5d20: e077a000 ebf3d000 00000001 80239bf8 7f039000 00000001 82acb1c4 82aca5a0 5d40: 7f039000 ebf3d000 8280c9b4 ea805d9c ea805da0 ea805d70 80230af0 80239c10 5d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea118>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e94>] (__purge_vmap_area_lazy) from [<804ea4d0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea805dc0 r5:ea805e08 r4:ea805dc0 [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e556c0 r4:00000000 [<804edfc8>] (vfree) from [<80559050>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:85c68c00 r7:00000000 r6:83018600 r5:00001000 r4:7f051000 [<80559020>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfa8b000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85c3378c r4:8598ff80 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:85c3378c r4:8598ff80 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85c68c00 r8:8598ffac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:8598ff80 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8598ff80 r8:80278fec r7:ea751e60 r6:8598f900 r5:85c68c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea805fb0 to 0xea805ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85926dc0 INFO: task kworker/1:192:4818 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:192 state:D stack:0 pid:4818 tgid:4818 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6391c>] (__schedule) from [<81a648b0>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a6391c>] (__schedule) from [<81a648b0>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ea779d84 r9:00000002 r8:60000113 r7:829171a0 r6:ea779d8c r5:859ec800 r4:859ec800 [<81a64884>] (schedule) from [<81a64c98>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:859ec800 r4:8291719c [<81a64c80>] (schedule_preempt_disabled) from [<81a67848>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64c80>] (schedule_preempt_disabled) from [<81a67848>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a674f8>] (__mutex_lock.constprop.0) from [<81a67ff0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea779e08 r4:00000000 [<81a67fdc>] (__mutex_lock_slowpath) from [<81a68030>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a67ff4>] (mutex_lock) from [<804ea354>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e51ec0 r4:00000000 [<804edfc8>] (vfree) from [<80559050>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:859ec800 r7:00000000 r6:83018600 r5:00001000 r4:7f04d000 [<80559020>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea609000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85c4338c r4:84bf5700 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:85c4338c r4:84bf5700 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:859ec800 r8:84bf572c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:84bf5700 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84bf5700 r8:80278fec r7:ea805e60 r6:8598e500 r5:859ec800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea779fb0 to 0xea779ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85ab3700 INFO: task kworker/1:192:4818 is blocked on a mutex likely owned by task kworker/1:179:4790. task:kworker/1:179 state:R running task stack:0 pid:4790 tgid:4790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6391c>] (__schedule) from [<81a64ce4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:85c68c00 r8:80200c04 r7:ea805d54 r6:ffffffff r5:85c68c00 r4:00000000 [<81a64ca4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea805d20 to 0xea805d68) 5d20: e077a000 ebf3d000 00000001 80239bf8 7f039000 00000001 82acb1c4 82aca5a0 5d40: 7f039000 ebf3d000 8280c9b4 ea805d9c ea805da0 ea805d70 80230af0 80239c10 5d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea118>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e94>] (__purge_vmap_area_lazy) from [<804ea4d0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea805dc0 r5:ea805e08 r4:ea805dc0 [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e556c0 r4:00000000 [<804edfc8>] (vfree) from [<80559050>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:85c68c00 r7:00000000 r6:83018600 r5:00001000 r4:7f051000 [<80559020>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfa8b000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85c3378c r4:8598ff80 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:85c3378c r4:8598ff80 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85c68c00 r8:8598ffac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:8598ff80 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8598ff80 r8:80278fec r7:ea751e60 r6:8598f900 r5:85c68c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea805fb0 to 0xea805ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85926dc0 INFO: task kworker/0:284:6012 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:284 state:D stack:0 pid:6012 tgid:6012 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6391c>] (__schedule) from [<81a648b0>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a6391c>] (__schedule) from [<81a648b0>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:eadf9d84 r9:00000002 r8:60000113 r7:829171a0 r6:eadf9d8c r5:85deec00 r4:85deec00 [<81a64884>] (schedule) from [<81a64c98>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:85deec00 r4:8291719c [<81a64c80>] (schedule_preempt_disabled) from [<81a67848>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64c80>] (schedule_preempt_disabled) from [<81a67848>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a674f8>] (__mutex_lock.constprop.0) from [<81a67ff0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadf9e08 r4:00000000 [<81a67fdc>] (__mutex_lock_slowpath) from [<81a68030>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a67ff4>] (mutex_lock) from [<804ea354>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8588d400 r4:00000000 [<804edfc8>] (vfree) from [<80559050>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:85deec00 r7:00000000 r6:83018400 r5:00001000 r4:7f057000 [<80559020>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:e0109000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85eb4b8c r4:85a9d100 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:85eb4b8c r4:85a9d100 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85deec00 r8:85a9d12c r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:85a9d100 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85a9d100 r8:80278fec r7:eade1e60 r6:85a9d180 r5:85deec00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadf9fb0 to 0xeadf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85aaa040 INFO: task kworker/0:284:6012 is blocked on a mutex likely owned by task kworker/1:179:4790. task:kworker/1:179 state:R running task stack:0 pid:4790 tgid:4790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6391c>] (__schedule) from [<81a64ce4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:85c68c00 r8:80200c04 r7:ea805d54 r6:ffffffff r5:85c68c00 r4:00000000 [<81a64ca4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea805d20 to 0xea805d68) 5d20: e077a000 ebf3d000 00000001 80239bf8 7f039000 00000001 82acb1c4 82aca5a0 5d40: 7f039000 ebf3d000 8280c9b4 ea805d9c ea805da0 ea805d70 80230af0 80239c10 5d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea118>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e94>] (__purge_vmap_area_lazy) from [<804ea4d0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea805dc0 r5:ea805e08 r4:ea805dc0 [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e556c0 r4:00000000 [<804edfc8>] (vfree) from [<80559050>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:85c68c00 r7:00000000 r6:83018600 r5:00001000 r4:7f051000 [<80559020>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfa8b000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85c3378c r4:8598ff80 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:85c3378c r4:8598ff80 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85c68c00 r8:8598ffac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:8598ff80 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8598ff80 r8:80278fec r7:ea751e60 r6:8598f900 r5:85c68c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea805fb0 to 0xea805ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85926dc0 INFO: task kworker/0:287:6018 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:287 state:D stack:0 pid:6018 tgid:6018 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6391c>] (__schedule) from [<81a648b0>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a6391c>] (__schedule) from [<81a648b0>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:eae05d84 r9:00000002 r8:60000113 r7:829171a0 r6:eae05d8c r5:83c93c00 r4:83c93c00 [<81a64884>] (schedule) from [<81a64c98>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:83c93c00 r4:8291719c [<81a64c80>] (schedule_preempt_disabled) from [<81a67848>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64c80>] (schedule_preempt_disabled) from [<81a67848>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a674f8>] (__mutex_lock.constprop.0) from [<81a67ff0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae05e08 r4:00000000 [<81a67fdc>] (__mutex_lock_slowpath) from [<81a68030>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a67ff4>] (mutex_lock) from [<804ea354>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848dc200 r4:00000000 [<804edfc8>] (vfree) from [<80559050>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:83c93c00 r7:00000000 r6:83018400 r5:00001000 r4:7f053000 [<80559020>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfbef000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85c2738c r4:85a9d400 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:85c2738c r4:85a9d400 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:83c93c00 r8:85a9d42c r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:85a9d400 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85a9d400 r8:80278fec r7:eadf9e60 r6:85a9d480 r5:83c93c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae05fb0 to 0xeae05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85e3e540 INFO: task kworker/0:287:6018 is blocked on a mutex likely owned by task kworker/1:179:4790. task:kworker/1:179 state:R running task stack:0 pid:4790 tgid:4790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6391c>] (__schedule) from [<81a64ce4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:85c68c00 r8:80200c04 r7:ea805d54 r6:ffffffff r5:85c68c00 r4:00000000 [<81a64ca4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea805d20 to 0xea805d68) 5d20: e077a000 ebf3d000 00000001 80239bf8 7f039000 00000001 82acb1c4 82aca5a0 5d40: 7f039000 ebf3d000 8280c9b4 ea805d9c ea805da0 ea805d70 80230af0 80239c10 5d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea118>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e94>] (__purge_vmap_area_lazy) from [<804ea4d0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea805dc0 r5:ea805e08 r4:ea805dc0 [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e556c0 r4:00000000 [<804edfc8>] (vfree) from [<80559050>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:85c68c00 r7:00000000 r6:83018600 r5:00001000 r4:7f051000 [<80559020>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfa8b000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85c3378c r4:8598ff80 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:85c3378c r4:8598ff80 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85c68c00 r8:8598ffac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:8598ff80 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8598ff80 r8:80278fec r7:ea751e60 r6:8598f900 r5:85c68c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea805fb0 to 0xea805ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85926dc0 INFO: task kworker/0:288:6021 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:288 state:D stack:0 pid:6021 tgid:6021 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6391c>] (__schedule) from [<81a648b0>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a6391c>] (__schedule) from [<81a648b0>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:eae09d84 r9:00000002 r8:60000113 r7:829171a0 r6:eae09d8c r5:83c95400 r4:83c95400 [<81a64884>] (schedule) from [<81a64c98>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:83c95400 r4:8291719c [<81a64c80>] (schedule_preempt_disabled) from [<81a67848>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64c80>] (schedule_preempt_disabled) from [<81a67848>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a674f8>] (__mutex_lock.constprop.0) from [<81a67ff0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae09e08 r4:00000000 [<81a67fdc>] (__mutex_lock_slowpath) from [<81a68030>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a67ff4>] (mutex_lock) from [<804ea354>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859925c0 r4:00000000 [<804edfc8>] (vfree) from [<80559050>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:83c95400 r7:00000000 r6:83018400 r5:00001000 r4:7f055000 [<80559020>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dffb9000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85eb438c r4:85a9d580 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:85eb438c r4:85a9d580 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:83c95400 r8:85a9d5ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:85a9d580 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85a9d580 r8:80278fec r7:eadf9e60 r6:85a9d600 r5:83c95400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae09fb0 to 0xeae09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:8588d180 INFO: task kworker/0:288:6021 is blocked on a mutex likely owned by task kworker/1:179:4790. task:kworker/1:179 state:R running task stack:0 pid:4790 tgid:4790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6391c>] (__schedule) from [<81a64ce4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:85c68c00 r8:80200c04 r7:ea805d54 r6:ffffffff r5:85c68c00 r4:00000000 [<81a64ca4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea805d20 to 0xea805d68) 5d20: e077a000 ebf3d000 00000001 80239bf8 7f039000 00000001 82acb1c4 82aca5a0 5d40: 7f039000 ebf3d000 8280c9b4 ea805d9c ea805da0 ea805d70 80230af0 80239c10 5d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea118>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e94>] (__purge_vmap_area_lazy) from [<804ea4d0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea805dc0 r5:ea805e08 r4:ea805dc0 [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e556c0 r4:00000000 [<804edfc8>] (vfree) from [<80559050>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:85c68c00 r7:00000000 r6:83018600 r5:00001000 r4:7f051000 [<80559020>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfa8b000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85c3378c r4:8598ff80 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:85c3378c r4:8598ff80 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85c68c00 r8:8598ffac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:8598ff80 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8598ff80 r8:80278fec r7:ea751e60 r6:8598f900 r5:85c68c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea805fb0 to 0xea805ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85926dc0 INFO: task kworker/0:289:6023 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:289 state:D stack:0 pid:6023 tgid:6023 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6391c>] (__schedule) from [<81a648b0>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a6391c>] (__schedule) from [<81a648b0>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:eae0dd84 r9:00000002 r8:60000113 r7:829171a0 r6:eae0dd8c r5:83c96000 r4:83c96000 [<81a64884>] (schedule) from [<81a64c98>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:83c96000 r4:8291719c [<81a64c80>] (schedule_preempt_disabled) from [<81a67848>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64c80>] (schedule_preempt_disabled) from [<81a67848>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a674f8>] (__mutex_lock.constprop.0) from [<81a67ff0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae0de08 r4:00000000 [<81a67fdc>] (__mutex_lock_slowpath) from [<81a68030>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a67ff4>] (mutex_lock) from [<804ea354>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8588d700 r4:00000000 [<804edfc8>] (vfree) from [<80559050>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:83c96000 r7:00000000 r6:83018400 r5:00001000 r4:7f059000 [<80559020>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:e420f000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85eb4f8c r4:85a9d680 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:85eb4f8c r4:85a9d680 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:83c96000 r8:85a9d6ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:85a9d680 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85a9d680 r8:80278fec r7:eadf9e60 r6:85a9d700 r5:83c96000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae0dfb0 to 0xeae0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:8588d380 INFO: task kworker/0:289:6023 is blocked on a mutex likely owned by task kworker/1:179:4790. task:kworker/1:179 state:R running task stack:0 pid:4790 tgid:4790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6391c>] (__schedule) from [<81a64ce4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:85c68c00 r8:80200c04 r7:ea805d54 r6:ffffffff r5:85c68c00 r4:00000000 [<81a64ca4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea805d20 to 0xea805d68) 5d20: e077a000 ebf3d000 00000001 80239bf8 7f039000 00000001 82acb1c4 82aca5a0 5d40: 7f039000 ebf3d000 8280c9b4 ea805d9c ea805da0 ea805d70 80230af0 80239c10 5d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea118>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e94>] (__purge_vmap_area_lazy) from [<804ea4d0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea805dc0 r5:ea805e08 r4:ea805dc0 [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e556c0 r4:00000000 [<804edfc8>] (vfree) from [<80559050>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:85c68c00 r7:00000000 r6:83018600 r5:00001000 r4:7f051000 [<80559020>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfa8b000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85c3378c r4:8598ff80 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:85c3378c r4:8598ff80 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85c68c00 r8:8598ffac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:8598ff80 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8598ff80 r8:80278fec r7:ea751e60 r6:8598f900 r5:85c68c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea805fb0 to 0xea805ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85926dc0 INFO: task kworker/0:290:6025 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:290 state:D stack:0 pid:6025 tgid:6025 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6391c>] (__schedule) from [<81a648b0>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a6391c>] (__schedule) from [<81a648b0>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:eae11d84 r9:00000002 r8:60000013 r7:829171a0 r6:eae11d8c r5:83bfec00 r4:83bfec00 [<81a64884>] (schedule) from [<81a64c98>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:83bfec00 r4:8291719c [<81a64c80>] (schedule_preempt_disabled) from [<81a67848>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64c80>] (schedule_preempt_disabled) from [<81a67848>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a674f8>] (__mutex_lock.constprop.0) from [<81a67ff0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae11e08 r4:00000000 [<81a67fdc>] (__mutex_lock_slowpath) from [<81a68030>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a67ff4>] (mutex_lock) from [<804ea354>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8588df00 r4:00000000 [<804edfc8>] (vfree) from [<80559050>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:83bfec00 r7:00000000 r6:83018400 r5:00001000 r4:7f061000 [<80559020>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:eab1b000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85c42f8c r4:85a9d780 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:85c42f8c r4:85a9d780 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:83bfec00 r8:85a9d7ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:85a9d780 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85a9d780 r8:80278fec r7:eae0de60 r6:85a9d800 r5:83bfec00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae11fb0 to 0xeae11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:8588d680 INFO: task kworker/0:290:6025 is blocked on a mutex likely owned by task kworker/1:179:4790. task:kworker/1:179 state:R running task stack:0 pid:4790 tgid:4790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6391c>] (__schedule) from [<81a64ce4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:85c68c00 r8:80200c04 r7:ea805d54 r6:ffffffff r5:85c68c00 r4:00000000 [<81a64ca4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea805d20 to 0xea805d68) 5d20: e077a000 ebf3d000 00000001 80239bf8 7f039000 00000001 82acb1c4 82aca5a0 5d40: 7f039000 ebf3d000 8280c9b4 ea805d9c ea805da0 ea805d70 80230af0 80239c10 5d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea118>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e94>] (__purge_vmap_area_lazy) from [<804ea4d0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea805dc0 r5:ea805e08 r4:ea805dc0 [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e556c0 r4:00000000 [<804edfc8>] (vfree) from [<80559050>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:85c68c00 r7:00000000 r6:83018600 r5:00001000 r4:7f051000 [<80559020>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfa8b000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85c3378c r4:8598ff80 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:85c3378c r4:8598ff80 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85c68c00 r8:8598ffac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:8598ff80 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8598ff80 r8:80278fec r7:ea751e60 r6:8598f900 r5:85c68c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea805fb0 to 0xea805ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85926dc0 INFO: task kworker/0:291:6026 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:291 state:D stack:0 pid:6026 tgid:6026 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6391c>] (__schedule) from [<81a648b0>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a6391c>] (__schedule) from [<81a648b0>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:eadfdd84 r9:00000002 r8:60000113 r7:829171a0 r6:eadfdd8c r5:85b7e000 r4:85b7e000 [<81a64884>] (schedule) from [<81a64c98>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:85b7e000 r4:8291719c [<81a64c80>] (schedule_preempt_disabled) from [<81a67848>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64c80>] (schedule_preempt_disabled) from [<81a67848>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a674f8>] (__mutex_lock.constprop.0) from [<81a67ff0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadfde08 r4:00000000 [<81a67fdc>] (__mutex_lock_slowpath) from [<81a68030>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a67ff4>] (mutex_lock) from [<804ea354>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8588db40 r4:00000000 [<804edfc8>] (vfree) from [<80559050>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:85b7e000 r7:00000000 r6:83018400 r5:00001000 r4:7f05d000 [<80559020>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea53d000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85eb538c r4:85a9d880 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:85eb538c r4:85a9d880 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85b7e000 r8:85a9d8ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:85a9d880 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85a9d880 r8:80278fec r7:eae11e60 r6:85e4da00 r5:85b7e000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadfdfb0 to 0xeadfdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:8588d880 INFO: task kworker/0:291:6026 is blocked on a mutex likely owned by task kworker/1:179:4790. task:kworker/1:179 state:R running task stack:0 pid:4790 tgid:4790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6391c>] (__schedule) from [<81a64ce4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:85c68c00 r8:80200c04 r7:ea805d54 r6:ffffffff r5:85c68c00 r4:00000000 [<81a64ca4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea805d20 to 0xea805d68) 5d20: e077a000 ebf3d000 00000001 80239bf8 7f039000 00000001 82acb1c4 82aca5a0 5d40: 7f039000 ebf3d000 8280c9b4 ea805d9c ea805da0 ea805d70 80230af0 80239c10 5d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea118>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e94>] (__purge_vmap_area_lazy) from [<804ea4d0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea805dc0 r5:ea805e08 r4:ea805dc0 [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e556c0 r4:00000000 [<804edfc8>] (vfree) from [<80559050>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:85c68c00 r7:00000000 r6:83018600 r5:00001000 r4:7f051000 [<80559020>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfa8b000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85c3378c r4:8598ff80 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:85c3378c r4:8598ff80 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85c68c00 r8:8598ffac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:8598ff80 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8598ff80 r8:80278fec r7:ea751e60 r6:8598f900 r5:85c68c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea805fb0 to 0xea805ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85926dc0 INFO: task kworker/0:292:6028 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:292 state:D stack:0 pid:6028 tgid:6028 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6391c>] (__schedule) from [<81a648b0>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a6391c>] (__schedule) from [<81a648b0>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:eae19d84 r9:00000002 r8:60000013 r7:829171a0 r6:eae19d8c r5:85b7b000 r4:85b7b000 [<81a64884>] (schedule) from [<81a64c98>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:85b7b000 r4:8291719c [<81a64c80>] (schedule_preempt_disabled) from [<81a67848>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64c80>] (schedule_preempt_disabled) from [<81a67848>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a674f8>] (__mutex_lock.constprop.0) from [<81a67ff0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae19e08 r4:00000000 [<81a67fdc>] (__mutex_lock_slowpath) from [<81a68030>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a67ff4>] (mutex_lock) from [<804ea354>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8588de80 r4:00000000 [<804edfc8>] (vfree) from [<80559050>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:85b7b000 r7:00000000 r6:83018400 r5:00001000 r4:7f05f000 [<80559020>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:eaa2d000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85eb478c r4:85a9da00 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:85eb478c r4:85a9da00 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85b7b000 r8:85a9da2c r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:85a9da00 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85a9da00 r8:80278fec r7:eae11e60 r6:85e4de80 r5:85b7b000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae19fb0 to 0xeae19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:8588dac0 INFO: task kworker/0:292:6028 is blocked on a mutex likely owned by task kworker/1:179:4790. task:kworker/1:179 state:R running task stack:0 pid:4790 tgid:4790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6391c>] (__schedule) from [<81a64ce4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:85c68c00 r8:80200c04 r7:ea805d54 r6:ffffffff r5:85c68c00 r4:00000000 [<81a64ca4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea805d20 to 0xea805d68) 5d20: e077a000 ebf3d000 00000001 80239bf8 7f039000 00000001 82acb1c4 82aca5a0 5d40: 7f039000 ebf3d000 8280c9b4 ea805d9c ea805da0 ea805d70 80230af0 80239c10 5d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea118>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e94>] (__purge_vmap_area_lazy) from [<804ea4d0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea805dc0 r5:ea805e08 r4:ea805dc0 [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e556c0 r4:00000000 [<804edfc8>] (vfree) from [<80559050>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:85c68c00 r7:00000000 r6:83018600 r5:00001000 r4:7f051000 [<80559020>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfa8b000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85c3378c r4:8598ff80 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:85c3378c r4:8598ff80 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85c68c00 r8:8598ffac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:8598ff80 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8598ff80 r8:80278fec r7:ea751e60 r6:8598f900 r5:85c68c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea805fb0 to 0xea805ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85926dc0 INFO: task kworker/0:293:6031 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:293 state:D stack:0 pid:6031 tgid:6031 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6391c>] (__schedule) from [<81a648b0>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a6391c>] (__schedule) from [<81a648b0>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:eae25d84 r9:00000002 r8:60000113 r7:829171a0 r6:eae25d8c r5:85de6c00 r4:85de6c00 [<81a64884>] (schedule) from [<81a64c98>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:85de6c00 r4:8291719c [<81a64c80>] (schedule_preempt_disabled) from [<81a67848>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64c80>] (schedule_preempt_disabled) from [<81a67848>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a674f8>] (__mutex_lock.constprop.0) from [<81a67ff0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae25e08 r4:00000000 [<81a67fdc>] (__mutex_lock_slowpath) from [<81a68030>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a67ff4>] (mutex_lock) from [<804ea354>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8582c340 r4:00000000 [<804edfc8>] (vfree) from [<80559050>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:85de6c00 r7:00000000 r6:83018400 r5:00001000 r4:7f047000 [<80559020>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea3e1000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85eb138c r4:85a9d980 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:85eb138c r4:85a9d980 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85de6c00 r8:85a9d9ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:85a9d980 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85a9d980 r8:80278fec r7:eae11e60 r6:85e4df80 r5:85de6c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae25fb0 to 0xeae25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:8588de00 INFO: task kworker/0:293:6031 is blocked on a mutex likely owned by task kworker/1:179:4790. task:kworker/1:179 state:R running task stack:0 pid:4790 tgid:4790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6391c>] (__schedule) from [<81a64ce4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:85c68c00 r8:80200c04 r7:ea805d54 r6:ffffffff r5:85c68c00 r4:00000000 [<81a64ca4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea805d20 to 0xea805d68) 5d20: e077a000 ebf3d000 00000001 80239bf8 7f039000 00000001 82acb1c4 82aca5a0 5d40: 7f039000 ebf3d000 8280c9b4 ea805d9c ea805da0 ea805d70 80230af0 80239c10 5d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea118>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e94>] (__purge_vmap_area_lazy) from [<804ea4d0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea805dc0 r5:ea805e08 r4:ea805dc0 [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e556c0 r4:00000000 [<804edfc8>] (vfree) from [<80559050>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:85c68c00 r7:00000000 r6:83018600 r5:00001000 r4:7f051000 [<80559020>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfa8b000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85c3378c r4:8598ff80 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:85c3378c r4:8598ff80 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85c68c00 r8:8598ffac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:8598ff80 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8598ff80 r8:80278fec r7:ea751e60 r6:8598f900 r5:85c68c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea805fb0 to 0xea805ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85926dc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:294:6032 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:294 state:D stack:0 pid:6032 tgid:6032 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6391c>] (__schedule) from [<81a648b0>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a6391c>] (__schedule) from [<81a648b0>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:eae15d84 r9:00000002 r8:60000013 r7:829171a0 r6:eae15d8c r5:8321d400 r4:8321d400 [<81a64884>] (schedule) from [<81a64c98>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:8321d400 r4:8291719c [<81a64c80>] (schedule_preempt_disabled) from [<81a67848>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64c80>] (schedule_preempt_disabled) from [<81a67848>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a674f8>] (__mutex_lock.constprop.0) from [<81a67ff0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae15e08 r4:00000000 [<81a67fdc>] (__mutex_lock_slowpath) from [<81a68030>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a67ff4>] (mutex_lock) from [<804ea354>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8588d180 r4:00000000 [<804edfc8>] (vfree) from [<80559050>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:8321d400 r7:00000000 r6:83018400 r5:00001000 r4:7f063000 [<80559020>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:eabdb000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85eb5b8c r4:85a9d900 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:85eb5b8c r4:85a9d900 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:8321d400 r8:85a9d92c r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:85a9d900 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85a9d900 r8:80278fec r7:eae25e60 r6:85a9da80 r5:8321d400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae15fb0 to 0xeae15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:8588de00 INFO: task kworker/0:294:6032 is blocked on a mutex likely owned by task kworker/1:179:4790. task:kworker/1:179 state:R running task stack:0 pid:4790 tgid:4790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6391c>] (__schedule) from [<81a64ce4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:85c68c00 r8:80200c04 r7:ea805d54 r6:ffffffff r5:85c68c00 r4:00000000 [<81a64ca4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea805d20 to 0xea805d68) 5d20: e077a000 ebf3d000 00000001 80239bf8 7f039000 00000001 82acb1c4 82aca5a0 5d40: 7f039000 ebf3d000 8280c9b4 ea805d9c ea805da0 ea805d70 80230af0 80239c10 5d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea118>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e94>] (__purge_vmap_area_lazy) from [<804ea4d0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea805dc0 r5:ea805e08 r4:ea805dc0 [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e556c0 r4:00000000 [<804edfc8>] (vfree) from [<80559050>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:85c68c00 r7:00000000 r6:83018600 r5:00001000 r4:7f051000 [<80559020>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfa8b000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85c3378c r4:8598ff80 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:85c3378c r4:8598ff80 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85c68c00 r8:8598ffac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:8598ff80 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8598ff80 r8:80278fec r7:ea751e60 r6:8598f900 r5:85c68c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea805fb0 to 0xea805ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85926dc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:295:6034 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:295 state:D stack:0 pid:6034 tgid:6034 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6391c>] (__schedule) from [<81a648b0>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a6391c>] (__schedule) from [<81a648b0>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:eae29d84 r9:00000002 r8:60000013 r7:829171a0 r6:eae29d8c r5:85df8000 r4:85df8000 [<81a64884>] (schedule) from [<81a64c98>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:85df8000 r4:8291719c [<81a64c80>] (schedule_preempt_disabled) from [<81a67848>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64c80>] (schedule_preempt_disabled) from [<81a67848>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a674f8>] (__mutex_lock.constprop.0) from [<81a67ff0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae29e08 r4:00000000 [<81a67fdc>] (__mutex_lock_slowpath) from [<81a68030>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a67ff4>] (mutex_lock) from [<804ea354>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8588d940 r4:00000000 [<804edfc8>] (vfree) from [<80559050>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:85df8000 r7:00000000 r6:83018400 r5:00001000 r4:7f065000 [<80559020>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:eac7f000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85eb6b8c r4:85a9db00 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:85eb6b8c r4:85a9db00 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85df8000 r8:85a9db2c r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:85a9db00 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85a9db00 r8:80278fec r7:eae25e60 r6:85a9dc00 r5:85df8000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae29fb0 to 0xeae29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:8588dd80 INFO: task kworker/0:295:6034 is blocked on a mutex likely owned by task kworker/1:179:4790. task:kworker/1:179 state:R running task stack:0 pid:4790 tgid:4790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6391c>] (__schedule) from [<81a64ce4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:85c68c00 r8:80200c04 r7:ea805d54 r6:ffffffff r5:85c68c00 r4:00000000 [<81a64ca4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea805d20 to 0xea805d68) 5d20: e077a000 ebf3d000 00000001 80239bf8 7f039000 00000001 82acb1c4 82aca5a0 5d40: 7f039000 ebf3d000 8280c9b4 ea805d9c ea805da0 ea805d70 80230af0 80239c10 5d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea118>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e94>] (__purge_vmap_area_lazy) from [<804ea4d0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea805dc0 r5:ea805e08 r4:ea805dc0 [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e556c0 r4:00000000 [<804edfc8>] (vfree) from [<80559050>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:85c68c00 r7:00000000 r6:83018600 r5:00001000 r4:7f051000 [<80559020>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfa8b000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85c3378c r4:8598ff80 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:85c3378c r4:8598ff80 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85c68c00 r8:8598ffac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:8598ff80 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8598ff80 r8:80278fec r7:ea751e60 r6:8598f900 r5:85c68c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea805fb0 to 0xea805ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85926dc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:296:6037 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:296 state:D stack:0 pid:6037 tgid:6037 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6391c>] (__schedule) from [<81a648b0>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a6391c>] (__schedule) from [<81a648b0>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:eae1dd84 r9:00000002 r8:60000013 r7:829171a0 r6:eae1dd8c r5:85df9800 r4:85df9800 [<81a64884>] (schedule) from [<81a64c98>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:85df9800 r4:8291719c [<81a64c80>] (schedule_preempt_disabled) from [<81a67848>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64c80>] (schedule_preempt_disabled) from [<81a67848>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a674f8>] (__mutex_lock.constprop.0) from [<81a67ff0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae1de08 r4:00000000 [<81a67fdc>] (__mutex_lock_slowpath) from [<81a68030>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a67ff4>] (mutex_lock) from [<804ea354>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e55dc0 r4:00000000 [<804edfc8>] (vfree) from [<80559050>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:85df9800 r7:00000000 r6:83018400 r5:00001000 r4:7f067000 [<80559020>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:eacfb000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85eb738c r4:85a9dd00 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:85eb738c r4:85a9dd00 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85df9800 r8:85a9dd2c r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:85a9dd00 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85a9dd00 r8:80278fec r7:eae25e60 r6:85a9dd80 r5:85df9800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae1dfb0 to 0xeae1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:84bf3640 INFO: task kworker/0:296:6037 is blocked on a mutex likely owned by task kworker/1:179:4790. task:kworker/1:179 state:R running task stack:0 pid:4790 tgid:4790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6391c>] (__schedule) from [<81a64ce4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:85c68c00 r8:80200c04 r7:ea805d54 r6:ffffffff r5:85c68c00 r4:00000000 [<81a64ca4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea805d20 to 0xea805d68) 5d20: e077a000 ebf3d000 00000001 80239bf8 7f039000 00000001 82acb1c4 82aca5a0 5d40: 7f039000 ebf3d000 8280c9b4 ea805d9c ea805da0 ea805d70 80230af0 80239c10 5d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea118>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e94>] (__purge_vmap_area_lazy) from [<804ea4d0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea805dc0 r5:ea805e08 r4:ea805dc0 [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e556c0 r4:00000000 [<804edfc8>] (vfree) from [<80559050>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:85c68c00 r7:00000000 r6:83018600 r5:00001000 r4:7f051000 [<80559020>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfa8b000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85c3378c r4:8598ff80 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:85c3378c r4:8598ff80 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85c68c00 r8:8598ffac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:8598ff80 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8598ff80 r8:80278fec r7:ea751e60 r6:8598f900 r5:85c68c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea805fb0 to 0xea805ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85926dc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:297:6039 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:297 state:D stack:0 pid:6039 tgid:6039 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6391c>] (__schedule) from [<81a648b0>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a6391c>] (__schedule) from [<81a648b0>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:eae3dd84 r9:00000002 r8:60000013 r7:829171a0 r6:eae3dd8c r5:8398c800 r4:8398c800 [<81a64884>] (schedule) from [<81a64c98>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:8398c800 r4:8291719c [<81a64c80>] (schedule_preempt_disabled) from [<81a67848>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64c80>] (schedule_preempt_disabled) from [<81a67848>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a674f8>] (__mutex_lock.constprop.0) from [<81a67ff0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae3de08 r4:00000000 [<81a67fdc>] (__mutex_lock_slowpath) from [<81a68030>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a67ff4>] (mutex_lock) from [<804ea354>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857f6500 r4:00000000 [<804edfc8>] (vfree) from [<80559050>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:8398c800 r7:00000000 r6:83018400 r5:00001000 r4:7f069000 [<80559020>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:eae39000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85eb678c r4:85a9de00 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:85eb678c r4:85a9de00 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:8398c800 r8:85a9de2c r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:85a9de00 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85a9de00 r8:80278fec r7:eae25e60 r6:85e4de00 r5:8398c800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae3dfb0 to 0xeae3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85e55600 INFO: task kworker/0:297:6039 is blocked on a mutex likely owned by task kworker/1:179:4790. task:kworker/1:179 state:R running task stack:0 pid:4790 tgid:4790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6391c>] (__schedule) from [<81a64ce4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:85c68c00 r8:80200c04 r7:ea805d54 r6:ffffffff r5:85c68c00 r4:00000000 [<81a64ca4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea805d20 to 0xea805d68) 5d20: e077a000 ebf3d000 00000001 80239bf8 7f039000 00000001 82acb1c4 82aca5a0 5d40: 7f039000 ebf3d000 8280c9b4 ea805d9c ea805da0 ea805d70 80230af0 80239c10 5d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea118>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e94>] (__purge_vmap_area_lazy) from [<804ea4d0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea805dc0 r5:ea805e08 r4:ea805dc0 [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e556c0 r4:00000000 [<804edfc8>] (vfree) from [<80559050>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:85c68c00 r7:00000000 r6:83018600 r5:00001000 r4:7f051000 [<80559020>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfa8b000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85c3378c r4:8598ff80 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:85c3378c r4:8598ff80 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85c68c00 r8:8598ffac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:8598ff80 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8598ff80 r8:80278fec r7:ea751e60 r6:8598f900 r5:85c68c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea805fb0 to 0xea805ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85926dc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:298:6041 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:298 state:D stack:0 pid:6041 tgid:6041 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6391c>] (__schedule) from [<81a648b0>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a6391c>] (__schedule) from [<81a648b0>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:eae61d84 r9:00000002 r8:60000113 r7:829171a0 r6:eae61d8c r5:85dfb000 r4:85dfb000 [<81a64884>] (schedule) from [<81a64c98>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:85dfb000 r4:8291719c [<81a64c80>] (schedule_preempt_disabled) from [<81a67848>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64c80>] (schedule_preempt_disabled) from [<81a67848>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a674f8>] (__mutex_lock.constprop.0) from [<81a67ff0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae61e08 r4:00000000 [<81a67fdc>] (__mutex_lock_slowpath) from [<81a68030>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a67ff4>] (mutex_lock) from [<804ea354>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a70a00 r4:00000000 [<804edfc8>] (vfree) from [<80559050>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:85dfb000 r7:00000000 r6:83018400 r5:00001000 r4:7f06d000 [<80559020>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:eae7d000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85eb578c r4:85a9de80 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:85eb578c r4:85a9de80 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85dfb000 r8:85a9deac r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:85a9de80 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85a9de80 r8:80278fec r7:eae25e60 r6:85a9df00 r5:85dfb000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae61fb0 to 0xeae61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:84bf0c40 INFO: task kworker/0:298:6041 is blocked on a mutex likely owned by task kworker/1:179:4790. task:kworker/1:179 state:R running task stack:0 pid:4790 tgid:4790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6391c>] (__schedule) from [<81a64ce4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:85c68c00 r8:80200c04 r7:ea805d54 r6:ffffffff r5:85c68c00 r4:00000000 [<81a64ca4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea805d20 to 0xea805d68) 5d20: e077a000 ebf3d000 00000001 80239bf8 7f039000 00000001 82acb1c4 82aca5a0 5d40: 7f039000 ebf3d000 8280c9b4 ea805d9c ea805da0 ea805d70 80230af0 80239c10 5d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea118>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e94>] (__purge_vmap_area_lazy) from [<804ea4d0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea805dc0 r5:ea805e08 r4:ea805dc0 [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e556c0 r4:00000000 [<804edfc8>] (vfree) from [<80559050>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:85c68c00 r7:00000000 r6:83018600 r5:00001000 r4:7f051000 [<80559020>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfa8b000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85c3378c r4:8598ff80 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:85c3378c r4:8598ff80 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85c68c00 r8:8598ffac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:8598ff80 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8598ff80 r8:80278fec r7:ea751e60 r6:8598f900 r5:85c68c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea805fb0 to 0xea805ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85926dc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:299:6044 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:299 state:D stack:0 pid:6044 tgid:6044 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6391c>] (__schedule) from [<81a648b0>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a6391c>] (__schedule) from [<81a648b0>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:eae89d84 r9:00000002 r8:60000013 r7:829171a0 r6:eae89d8c r5:85dfc800 r4:85dfc800 [<81a64884>] (schedule) from [<81a64c98>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:85dfc800 r4:8291719c [<81a64c80>] (schedule_preempt_disabled) from [<81a67848>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64c80>] (schedule_preempt_disabled) from [<81a67848>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a674f8>] (__mutex_lock.constprop.0) from [<81a67ff0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae89e08 r4:00000000 [<81a67fdc>] (__mutex_lock_slowpath) from [<81a68030>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a67ff4>] (mutex_lock) from [<804ea354>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8582c500 r4:00000000 [<804edfc8>] (vfree) from [<80559050>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:85dfc800 r7:00000000 r6:83018400 r5:00001000 r4:7f039000 [<80559020>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfa8f000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85eb7f8c r4:85a9df80 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:85eb7f8c r4:85a9df80 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85dfc800 r8:85a9dfac r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:85a9df80 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85a9df80 r8:80278fec r7:eae25e60 r6:85e5a000 r5:85dfc800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:8582c480 INFO: task kworker/0:299:6044 is blocked on a mutex likely owned by task kworker/1:179:4790. task:kworker/1:179 state:R running task stack:0 pid:4790 tgid:4790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6391c>] (__schedule) from [<81a64ce4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:85c68c00 r8:80200c04 r7:ea805d54 r6:ffffffff r5:85c68c00 r4:00000000 [<81a64ca4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea805d20 to 0xea805d68) 5d20: e077a000 ebf3d000 00000001 80239bf8 7f039000 00000001 82acb1c4 82aca5a0 5d40: 7f039000 ebf3d000 8280c9b4 ea805d9c ea805da0 ea805d70 80230af0 80239c10 5d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea118>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e94>] (__purge_vmap_area_lazy) from [<804ea4d0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea805dc0 r5:ea805e08 r4:ea805dc0 [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e556c0 r4:00000000 [<804edfc8>] (vfree) from [<80559050>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:85c68c00 r7:00000000 r6:83018600 r5:00001000 r4:7f051000 [<80559020>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfa8b000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85c3378c r4:8598ff80 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:85c3378c r4:8598ff80 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85c68c00 r8:8598ffac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:8598ff80 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8598ff80 r8:80278fec r7:ea751e60 r6:8598f900 r5:85c68c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea805fb0 to 0xea805ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85926dc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:300:6045 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:300 state:D stack:0 pid:6045 tgid:6045 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6391c>] (__schedule) from [<81a648b0>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a6391c>] (__schedule) from [<81a648b0>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:eae2dd84 r9:00000002 r8:60000113 r7:829171a0 r6:eae2dd8c r5:85df0000 r4:85df0000 [<81a64884>] (schedule) from [<81a64c98>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:85df0000 r4:8291719c [<81a64c80>] (schedule_preempt_disabled) from [<81a67848>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64c80>] (schedule_preempt_disabled) from [<81a67848>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a674f8>] (__mutex_lock.constprop.0) from [<81a67ff0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae2de08 r4:00000000 [<81a67fdc>] (__mutex_lock_slowpath) from [<81a68030>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a67ff4>] (mutex_lock) from [<804ea354>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8582ca80 r4:00000000 [<804edfc8>] (vfree) from [<80559050>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:85df0000 r7:00000000 r6:83018400 r5:00001000 r4:7f03f000 [<80559020>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfbcb000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85e2578c r4:85e5a080 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:85e2578c r4:85e5a080 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85df0000 r8:85e5a0ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:85e5a080 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85e5a080 r8:80278fec r7:eae25e60 r6:833c9680 r5:85df0000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae2dfb0 to 0xeae2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:8582c480 INFO: task kworker/0:300:6045 is blocked on a mutex likely owned by task kworker/1:179:4790. task:kworker/1:179 state:R running task stack:0 pid:4790 tgid:4790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6391c>] (__schedule) from [<81a64ce4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:85c68c00 r8:80200c04 r7:ea805d54 r6:ffffffff r5:85c68c00 r4:00000000 [<81a64ca4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea805d20 to 0xea805d68) 5d20: e3130000 ebf3d000 00000001 80239bf8 7f039000 00000001 82acb1c4 82aca5a0 5d40: 7f039000 ebf3d000 8280c9b4 ea805d9c ea805da0 ea805d70 80230af0 80239c10 5d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea118>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e94>] (__purge_vmap_area_lazy) from [<804ea4d0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea805dc0 r5:ea805e08 r4:ea805dc0 [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e556c0 r4:00000000 [<804edfc8>] (vfree) from [<80559050>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:85c68c00 r7:00000000 r6:83018600 r5:00001000 r4:7f051000 [<80559020>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfa8b000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85c3378c r4:8598ff80 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:85c3378c r4:8598ff80 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85c68c00 r8:8598ffac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:8598ff80 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8598ff80 r8:80278fec r7:ea751e60 r6:8598f900 r5:85c68c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea805fb0 to 0xea805ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85926dc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:301:6048 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:301 state:D stack:0 pid:6048 tgid:6048 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6391c>] (__schedule) from [<81a648b0>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a6391c>] (__schedule) from [<81a648b0>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:eae81d84 r9:00000002 r8:60000113 r7:829171a0 r6:eae81d8c r5:85df0c00 r4:85df0c00 [<81a64884>] (schedule) from [<81a64c98>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:85df0c00 r4:8291719c [<81a64c80>] (schedule_preempt_disabled) from [<81a67848>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64c80>] (schedule_preempt_disabled) from [<81a67848>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a674f8>] (__mutex_lock.constprop.0) from [<81a67ff0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae81e08 r4:00000000 [<81a67fdc>] (__mutex_lock_slowpath) from [<81a68030>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a67ff4>] (mutex_lock) from [<804ea354>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8582ccc0 r4:00000000 [<804edfc8>] (vfree) from [<80559050>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:85df0c00 r7:00000000 r6:83018400 r5:00001000 r4:7f045000 [<80559020>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea305000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85eb078c r4:85e5a100 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:85eb078c r4:85e5a100 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85df0c00 r8:85e5a12c r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:85e5a100 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85e5a100 r8:80278fec r7:eae25e60 r6:833c9600 r5:85df0c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae81fb0 to 0xeae81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:8582c7c0 INFO: task kworker/0:301:6048 is blocked on a mutex likely owned by task kworker/1:179:4790. task:kworker/1:179 state:R running task stack:0 pid:4790 tgid:4790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6391c>] (__schedule) from [<81a64ce4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:85c68c00 r8:80200c04 r7:ea805d54 r6:ffffffff r5:85c68c00 r4:00000000 [<81a64ca4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea805d20 to 0xea805d68) 5d20: e3130000 ebf3d000 00000001 80239bf8 7f039000 00000001 82acb1c4 82aca5a0 5d40: 7f039000 ebf3d000 8280c9b4 ea805d9c ea805da0 ea805d70 80230af0 80239c10 5d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea118>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e94>] (__purge_vmap_area_lazy) from [<804ea4d0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea805dc0 r5:ea805e08 r4:ea805dc0 [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e556c0 r4:00000000 [<804edfc8>] (vfree) from [<80559050>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:85c68c00 r7:00000000 r6:83018600 r5:00001000 r4:7f051000 [<80559020>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfa8b000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85c3378c r4:8598ff80 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:85c3378c r4:8598ff80 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85c68c00 r8:8598ffac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:8598ff80 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8598ff80 r8:80278fec r7:ea751e60 r6:8598f900 r5:85c68c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea805fb0 to 0xea805ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85926dc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:302:6050 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:302 state:D stack:0 pid:6050 tgid:6050 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6391c>] (__schedule) from [<81a648b0>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a6391c>] (__schedule) from [<81a648b0>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:eae5dd84 r9:00000002 r8:60000113 r7:829171a0 r6:eae5dd8c r5:85df1800 r4:85df1800 [<81a64884>] (schedule) from [<81a64c98>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:85df1800 r4:8291719c [<81a64c80>] (schedule_preempt_disabled) from [<81a67848>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64c80>] (schedule_preempt_disabled) from [<81a67848>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a674f8>] (__mutex_lock.constprop.0) from [<81a67ff0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae5de08 r4:00000000 [<81a67fdc>] (__mutex_lock_slowpath) from [<81a68030>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a67ff4>] (mutex_lock) from [<804ea354>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8582cb80 r4:00000000 [<804edfc8>] (vfree) from [<80559050>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:85df1800 r7:00000000 r6:83018400 r5:00001000 r4:7f04f000 [<80559020>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea71d000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85c43f8c r4:85e5a180 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:85c43f8c r4:85e5a180 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85df1800 r8:85e5a1ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:85e5a180 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85e5a180 r8:80278fec r7:eae25e60 r6:85938280 r5:85df1800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae5dfb0 to 0xeae5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:8582cd80 INFO: task kworker/0:302:6050 is blocked on a mutex likely owned by task kworker/1:179:4790. task:kworker/1:179 state:R running task stack:0 pid:4790 tgid:4790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6391c>] (__schedule) from [<81a64ce4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:85c68c00 r8:80200c04 r7:ea805d54 r6:ffffffff r5:85c68c00 r4:00000000 [<81a64ca4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea805d20 to 0xea805d68) 5d20: e3443000 ebf3d000 00000001 80239bf8 7f039000 00000001 82acb1c4 82aca5a0 5d40: 7f039000 ebf3d000 8280c9b4 ea805d9c ea805da0 ea805d70 80230af0 80239c10 5d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea118>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e94>] (__purge_vmap_area_lazy) from [<804ea4d0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea805dc0 r5:ea805e08 r4:ea805dc0 [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e556c0 r4:00000000 [<804edfc8>] (vfree) from [<80559050>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:85c68c00 r7:00000000 r6:83018600 r5:00001000 r4:7f051000 [<80559020>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfa8b000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85c3378c r4:8598ff80 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:85c3378c r4:8598ff80 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85c68c00 r8:8598ffac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:8598ff80 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8598ff80 r8:80278fec r7:ea751e60 r6:8598f900 r5:85c68c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea805fb0 to 0xea805ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85926dc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:303:6052 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:303 state:D stack:0 pid:6052 tgid:6052 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6391c>] (__schedule) from [<81a648b0>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a6391c>] (__schedule) from [<81a648b0>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:eae91d84 r9:00000002 r8:60000013 r7:829171a0 r6:eae91d8c r5:85dfec00 r4:85dfec00 [<81a64884>] (schedule) from [<81a64c98>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:85dfec00 r4:8291719c [<81a64c80>] (schedule_preempt_disabled) from [<81a67848>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64c80>] (schedule_preempt_disabled) from [<81a67848>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a674f8>] (__mutex_lock.constprop.0) from [<81a67ff0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae91e08 r4:00000000 [<81a67fdc>] (__mutex_lock_slowpath) from [<81a68030>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a67ff4>] (mutex_lock) from [<804ea354>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859aaac0 r4:00000000 [<804edfc8>] (vfree) from [<80559050>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:85dfec00 r7:00000000 r6:83018400 r5:00001000 r4:7f053000 [<80559020>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfc23000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85e1c38c r4:85e5a300 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:85e1c38c r4:85e5a300 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85dfec00 r8:85e5a32c r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:85e5a300 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85e5a300 r8:80278fec r7:eae5de60 r6:85e5a280 r5:85dfec00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae91fb0 to 0xeae91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85b126c0 INFO: task kworker/0:303:6052 is blocked on a mutex likely owned by task kworker/1:179:4790. task:kworker/1:179 state:R running task stack:0 pid:4790 tgid:4790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6391c>] (__schedule) from [<81a64ce4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:85c68c00 r8:80200c04 r7:ea805d54 r6:ffffffff r5:85c68c00 r4:00000000 [<81a64ca4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea805d20 to 0xea805d68) 5d20: e3903000 ebf3d000 00000001 80239bf8 7f039000 00000001 82acb1c4 82aca5a0 5d40: 7f039000 ebf3d000 8280c9b4 ea805d9c ea805da0 ea805d70 80230af0 80239c10 5d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea118>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e94>] (__purge_vmap_area_lazy) from [<804ea4d0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea805dc0 r5:ea805e08 r4:ea805dc0 [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e556c0 r4:00000000 [<804edfc8>] (vfree) from [<80559050>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:85c68c00 r7:00000000 r6:83018600 r5:00001000 r4:7f051000 [<80559020>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfa8b000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85c3378c r4:8598ff80 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:85c3378c r4:8598ff80 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85c68c00 r8:8598ffac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:8598ff80 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8598ff80 r8:80278fec r7:ea751e60 r6:8598f900 r5:85c68c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea805fb0 to 0xea805ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85926dc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:304:6055 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:304 state:D stack:0 pid:6055 tgid:6055 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6391c>] (__schedule) from [<81a648b0>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a6391c>] (__schedule) from [<81a648b0>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:eae99d84 r9:00000002 r8:60000113 r7:829171a0 r6:eae99d8c r5:85dfd400 r4:85dfd400 [<81a64884>] (schedule) from [<81a64c98>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:85dfd400 r4:8291719c [<81a64c80>] (schedule_preempt_disabled) from [<81a67848>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64c80>] (schedule_preempt_disabled) from [<81a67848>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a674f8>] (__mutex_lock.constprop.0) from [<81a67ff0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae99e08 r4:00000000 [<81a67fdc>] (__mutex_lock_slowpath) from [<81a68030>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a67ff4>] (mutex_lock) from [<804ea354>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859aa080 r4:00000000 [<804edfc8>] (vfree) from [<80559050>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:85dfd400 r7:00000000 r6:83018400 r5:00001000 r4:7f05b000 [<80559020>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea8f9000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85eb0f8c r4:85e5a200 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:85eb0f8c r4:85e5a200 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85dfd400 r8:85e5a22c r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:85e5a200 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85e5a200 r8:80278fec r7:eae91e60 r6:85e5a380 r5:85dfd400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae99fb0 to 0xeae99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85aaa400 INFO: task kworker/0:304:6055 is blocked on a mutex likely owned by task kworker/1:179:4790. task:kworker/1:179 state:R running task stack:0 pid:4790 tgid:4790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6391c>] (__schedule) from [<81a64ce4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:85c68c00 r8:80200c04 r7:ea805d54 r6:ffffffff r5:85c68c00 r4:00000000 [<81a64ca4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea805d20 to 0xea805d68) 5d20: e3903000 ebf3d000 00000001 80239bf8 7f039000 00000001 82acb1c4 82aca5a0 5d40: 7f039000 ebf3d000 8280c9b4 ea805d9c ea805da0 ea805d70 80230af0 80239c10 5d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea118>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e94>] (__purge_vmap_area_lazy) from [<804ea4d0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea805dc0 r5:ea805e08 r4:ea805dc0 [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e556c0 r4:00000000 [<804edfc8>] (vfree) from [<80559050>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:85c68c00 r7:00000000 r6:83018600 r5:00001000 r4:7f051000 [<80559020>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfa8b000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85c3378c r4:8598ff80 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:85c3378c r4:8598ff80 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85c68c00 r8:8598ffac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:8598ff80 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8598ff80 r8:80278fec r7:ea751e60 r6:8598f900 r5:85c68c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea805fb0 to 0xea805ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85926dc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:305:6057 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:305 state:D stack:0 pid:6057 tgid:6057 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6391c>] (__schedule) from [<81a648b0>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a6391c>] (__schedule) from [<81a648b0>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:eaeadd84 r9:00000002 r8:60000113 r7:829171a0 r6:eaeadd8c r5:85dfa400 r4:85dfa400 [<81a64884>] (schedule) from [<81a64c98>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:85dfa400 r4:8291719c [<81a64c80>] (schedule_preempt_disabled) from [<81a67848>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64c80>] (schedule_preempt_disabled) from [<81a67848>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a674f8>] (__mutex_lock.constprop.0) from [<81a67ff0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaeade08 r4:00000000 [<81a67fdc>] (__mutex_lock_slowpath) from [<81a68030>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a67ff4>] (mutex_lock) from [<804ea354>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859aa840 r4:00000000 [<804edfc8>] (vfree) from [<80559050>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:85dfa400 r7:00000000 r6:83018400 r5:00001000 r4:7f051000 [<80559020>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfa8d000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85eb7b8c r4:85e5a400 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:85eb7b8c r4:85e5a400 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85dfa400 r8:85e5a42c r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:85e5a400 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85e5a400 r8:80278fec r7:eae91e60 r6:85e5a480 r5:85dfa400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeadfb0 to 0xeaeadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:859aa2c0 INFO: task kworker/0:305:6057 is blocked on a mutex likely owned by task kworker/1:179:4790. task:kworker/1:179 state:R running task stack:0 pid:4790 tgid:4790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6391c>] (__schedule) from [<81a64ce4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:85c68c00 r8:80200c04 r7:ea805d54 r6:ffffffff r5:85c68c00 r4:00000000 [<81a64ca4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea805d20 to 0xea805d68) 5d20: e3aed000 ebf3d000 00000001 80239bf8 7f039000 00000001 82acb1c4 82aca5a0 5d40: 7f039000 ebf3d000 8280c9b4 ea805d9c ea805da0 ea805d70 80230af0 80239c10 5d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea118>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e94>] (__purge_vmap_area_lazy) from [<804ea4d0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea805dc0 r5:ea805e08 r4:ea805dc0 [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e556c0 r4:00000000 [<804edfc8>] (vfree) from [<80559050>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:85c68c00 r7:00000000 r6:83018600 r5:00001000 r4:7f051000 [<80559020>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfa8b000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85c3378c r4:8598ff80 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:85c3378c r4:8598ff80 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85c68c00 r8:8598ffac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:8598ff80 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8598ff80 r8:80278fec r7:ea751e60 r6:8598f900 r5:85c68c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea805fb0 to 0xea805ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85926dc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:306:6058 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:306 state:D stack:0 pid:6058 tgid:6058 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6391c>] (__schedule) from [<81a648b0>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a6391c>] (__schedule) from [<81a648b0>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:eae21d84 r9:00000002 r8:60000013 r7:829171a0 r6:eae21d8c r5:85dfbc00 r4:85dfbc00 [<81a64884>] (schedule) from [<81a64c98>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:85dfbc00 r4:8291719c [<81a64c80>] (schedule_preempt_disabled) from [<81a67848>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64c80>] (schedule_preempt_disabled) from [<81a67848>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a674f8>] (__mutex_lock.constprop.0) from [<81a67ff0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae21e08 r4:00000000 [<81a67fdc>] (__mutex_lock_slowpath) from [<81a68030>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a67ff4>] (mutex_lock) from [<804ea354>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859aa380 r4:00000000 [<804edfc8>] (vfree) from [<80559050>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:85dfbc00 r7:00000000 r6:83018400 r5:00001000 r4:7f059000 [<80559020>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea399000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85e2238c r4:85e5a500 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:85e2238c r4:85e5a500 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85dfbc00 r8:85e5a52c r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:85e5a500 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85e5a500 r8:80278fec r7:eae91e60 r6:85e5a580 r5:85dfbc00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae21fb0 to 0xeae21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:859aa200 INFO: task kworker/0:306:6058 is blocked on a mutex likely owned by task kworker/1:179:4790. task:kworker/1:179 state:R running task stack:0 pid:4790 tgid:4790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6391c>] (__schedule) from [<81a64ce4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:85c68c00 r8:80200c04 r7:ea805d54 r6:ffffffff r5:85c68c00 r4:00000000 [<81a64ca4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea805d20 to 0xea805d68) 5d20: e3d74000 ebf3d000 00000001 80239bf8 7f039000 00000001 82acb1c4 82aca5a0 5d40: 7f039000 ebf3d000 8280c9b4 ea805d9c ea805da0 ea805d70 80230af0 80239c10 5d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea118>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e94>] (__purge_vmap_area_lazy) from [<804ea4d0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea805dc0 r5:ea805e08 r4:ea805dc0 [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e556c0 r4:00000000 [<804edfc8>] (vfree) from [<80559050>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:85c68c00 r7:00000000 r6:83018600 r5:00001000 r4:7f051000 [<80559020>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfa8b000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85c3378c r4:8598ff80 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:85c3378c r4:8598ff80 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85c68c00 r8:8598ffac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:8598ff80 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8598ff80 r8:80278fec r7:ea751e60 r6:8598f900 r5:85c68c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea805fb0 to 0xea805ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85926dc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:307:6061 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:307 state:D stack:0 pid:6061 tgid:6061 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6391c>] (__schedule) from [<81a648b0>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a6391c>] (__schedule) from [<81a648b0>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:eae95d84 r9:00000002 r8:60000013 r7:829171a0 r6:eae95d8c r5:85dfe000 r4:85dfe000 [<81a64884>] (schedule) from [<81a64c98>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:85dfe000 r4:8291719c [<81a64c80>] (schedule_preempt_disabled) from [<81a67848>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64c80>] (schedule_preempt_disabled) from [<81a67848>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a674f8>] (__mutex_lock.constprop.0) from [<81a67ff0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae95e08 r4:00000000 [<81a67fdc>] (__mutex_lock_slowpath) from [<81a68030>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a67ff4>] (mutex_lock) from [<804ea354>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859aac80 r4:00000000 [<804edfc8>] (vfree) from [<80559050>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:85dfe000 r7:00000000 r6:83018400 r5:00001000 r4:7f055000 [<80559020>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:e0025000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85eb6f8c r4:85e5a600 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:85eb6f8c r4:85e5a600 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85dfe000 r8:85e5a62c r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:85e5a600 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85e5a600 r8:80278fec r7:eae21e60 r6:85e5a680 r5:85dfe000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae95fb0 to 0xeae95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:859aac00 INFO: task kworker/0:307:6061 is blocked on a mutex likely owned by task kworker/1:179:4790. task:kworker/1:179 state:R running task stack:0 pid:4790 tgid:4790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6391c>] (__schedule) from [<81a64ce4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:85c68c00 r8:80200c04 r7:ea805d54 r6:ffffffff r5:85c68c00 r4:00000000 [<81a64ca4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea805d20 to 0xea805d68) 5d20: e3e46000 ebf3d000 00000001 80239bf8 7f039000 00000001 82acb1c4 82aca5a0 5d40: 7f039000 ebf3d000 8280c9b4 ea805d9c ea805da0 ea805d70 80230af0 80239c10 5d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea118>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e94>] (__purge_vmap_area_lazy) from [<804ea4d0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea805dc0 r5:ea805e08 r4:ea805dc0 [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e556c0 r4:00000000 [<804edfc8>] (vfree) from [<80559050>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:85c68c00 r7:00000000 r6:83018600 r5:00001000 r4:7f051000 [<80559020>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfa8b000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85c3378c r4:8598ff80 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:85c3378c r4:8598ff80 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85c68c00 r8:8598ffac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:8598ff80 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8598ff80 r8:80278fec r7:ea751e60 r6:8598f900 r5:85c68c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea805fb0 to 0xea805ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85926dc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:308:6062 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:308 state:D stack:0 pid:6062 tgid:6062 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6391c>] (__schedule) from [<81a648b0>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a6391c>] (__schedule) from [<81a648b0>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:eae8dd84 r9:00000002 r8:60000113 r7:829171a0 r6:eae8dd8c r5:85df8c00 r4:85df8c00 [<81a64884>] (schedule) from [<81a64c98>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:85df8c00 r4:8291719c [<81a64c80>] (schedule_preempt_disabled) from [<81a67848>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64c80>] (schedule_preempt_disabled) from [<81a67848>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a674f8>] (__mutex_lock.constprop.0) from [<81a67ff0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae8de08 r4:00000000 [<81a67fdc>] (__mutex_lock_slowpath) from [<81a68030>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a67ff4>] (mutex_lock) from [<804ea354>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859aaf80 r4:00000000 [<804edfc8>] (vfree) from [<80559050>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:85df8c00 r7:00000000 r6:83018400 r5:00001000 r4:7f057000 [<80559020>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:e016f000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85eb778c r4:85e5a700 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:85eb778c r4:85e5a700 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85df8c00 r8:85e5a72c r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:85e5a700 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85e5a700 r8:80278fec r7:eae21e60 r6:85e5a780 r5:85df8c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae8dfb0 to 0xeae8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:859aac00 INFO: task kworker/0:308:6062 is blocked on a mutex likely owned by task kworker/1:179:4790. task:kworker/1:179 state:R running task stack:0 pid:4790 tgid:4790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6391c>] (__schedule) from [<81a64ce4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:85c68c00 r8:80200c04 r7:ea805d54 r6:ffffffff r5:85c68c00 r4:00000000 [<81a64ca4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea805d20 to 0xea805d68) 5d20: e3e46000 ebf3d000 00000001 80239bf8 7f039000 00000001 82acb1c4 82aca5a0 5d40: 7f039000 ebf3d000 8280c9b4 ea805d9c ea805da0 ea805d70 80230af0 80239c10 5d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea118>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e94>] (__purge_vmap_area_lazy) from [<804ea4d0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea805dc0 r5:ea805e08 r4:ea805dc0 [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e556c0 r4:00000000 [<804edfc8>] (vfree) from [<80559050>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:85c68c00 r7:00000000 r6:83018600 r5:00001000 r4:7f051000 [<80559020>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfa8b000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85c3378c r4:8598ff80 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:85c3378c r4:8598ff80 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85c68c00 r8:8598ffac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:8598ff80 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8598ff80 r8:80278fec r7:ea751e60 r6:8598f900 r5:85c68c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea805fb0 to 0xea805ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85926dc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:309:6065 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:309 state:D stack:0 pid:6065 tgid:6065 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6391c>] (__schedule) from [<81a648b0>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a6391c>] (__schedule) from [<81a648b0>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:eae41d84 r9:00000002 r8:60000013 r7:829171a0 r6:eae41d8c r5:85580000 r4:85580000 [<81a64884>] (schedule) from [<81a64c98>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:85580000 r4:8291719c [<81a64c80>] (schedule_preempt_disabled) from [<81a67848>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64c80>] (schedule_preempt_disabled) from [<81a67848>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a674f8>] (__mutex_lock.constprop.0) from [<81a67ff0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae41e08 r4:00000000 [<81a67fdc>] (__mutex_lock_slowpath) from [<81a68030>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a67ff4>] (mutex_lock) from [<804ea354>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8582cd40 r4:00000000 [<804edfc8>] (vfree) from [<80559050>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:85580000 r7:00000000 r6:83018400 r5:00001000 r4:7f05d000 [<80559020>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea9e9000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85ec0f8c r4:85e5a800 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:85ec0f8c r4:85e5a800 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85580000 r8:85e5a82c r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:85e5a800 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85e5a800 r8:80278fec r7:eae21e60 r6:85e5a900 r5:85580000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae41fb0 to 0xeae41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:859aaa40 INFO: task kworker/0:309:6065 is blocked on a mutex likely owned by task kworker/1:179:4790. task:kworker/1:179 state:R running task stack:0 pid:4790 tgid:4790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6391c>] (__schedule) from [<81a64ce4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:85c68c00 r8:80200c04 r7:ea805d54 r6:ffffffff r5:85c68c00 r4:00000000 [<81a64ca4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea805d20 to 0xea805d68) 5d20: e41f5000 ebf3d000 00000001 80239bf8 7f039000 00000001 82acb1c4 82aca5a0 5d40: 7f039000 ebf3d000 8280c9b4 ea805d9c ea805da0 ea805d70 80230af0 80239c10 5d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea118>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e94>] (__purge_vmap_area_lazy) from [<804ea4d0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea805dc0 r5:ea805e08 r4:ea805dc0 [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e556c0 r4:00000000 [<804edfc8>] (vfree) from [<80559050>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:85c68c00 r7:00000000 r6:83018600 r5:00001000 r4:7f051000 [<80559020>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfa8b000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85c3378c r4:8598ff80 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:85c3378c r4:8598ff80 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85c68c00 r8:8598ffac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:8598ff80 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8598ff80 r8:80278fec r7:ea751e60 r6:8598f900 r5:85c68c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea805fb0 to 0xea805ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85926dc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:310:6066 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:310 state:D stack:0 pid:6066 tgid:6066 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6391c>] (__schedule) from [<81a648b0>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a6391c>] (__schedule) from [<81a648b0>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:eae45d84 r9:00000002 r8:60000013 r7:829171a0 r6:eae45d8c r5:85df3c00 r4:85df3c00 [<81a64884>] (schedule) from [<81a64c98>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:85df3c00 r4:8291719c [<81a64c80>] (schedule_preempt_disabled) from [<81a67848>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64c80>] (schedule_preempt_disabled) from [<81a67848>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a674f8>] (__mutex_lock.constprop.0) from [<81a67ff0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae45e08 r4:00000000 [<81a67fdc>] (__mutex_lock_slowpath) from [<81a68030>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a67ff4>] (mutex_lock) from [<804ea354>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85830800 r4:00000000 [<804edfc8>] (vfree) from [<80559050>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:85df3c00 r7:00000000 r6:83018400 r5:00001000 r4:7f039000 [<80559020>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:df951000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85ec1b8c r4:85e5a980 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:85ec1b8c r4:85e5a980 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85df3c00 r8:85e5a9ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:85e5a980 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85e5a980 r8:80278fec r7:eae41e60 r6:859af400 r5:85df3c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae45fb0 to 0xeae45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:859aa4c0 INFO: task kworker/0:310:6066 is blocked on a mutex likely owned by task kworker/1:179:4790. task:kworker/1:179 state:R running task stack:0 pid:4790 tgid:4790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6391c>] (__schedule) from [<81a64ce4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:85c68c00 r8:80200c04 r7:ea805d54 r6:ffffffff r5:85c68c00 r4:00000000 [<81a64ca4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea805d20 to 0xea805d68) 5d20: e43ea000 ebf3d000 00000001 80239bf8 7f039000 00000001 82acb1c4 82aca5a0 5d40: 7f039000 ebf3d000 8280c9b4 ea805d9c ea805da0 ea805d70 80230af0 80239c10 5d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea118>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e94>] (__purge_vmap_area_lazy) from [<804ea4d0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea805dc0 r5:ea805e08 r4:ea805dc0 [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e556c0 r4:00000000 [<804edfc8>] (vfree) from [<80559050>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:85c68c00 r7:00000000 r6:83018600 r5:00001000 r4:7f051000 [<80559020>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfa8b000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85c3378c r4:8598ff80 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:85c3378c r4:8598ff80 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85c68c00 r8:8598ffac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:8598ff80 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8598ff80 r8:80278fec r7:ea751e60 r6:8598f900 r5:85c68c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea805fb0 to 0xea805ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85926dc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:311:6068 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:311 state:D stack:0 pid:6068 tgid:6068 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6391c>] (__schedule) from [<81a648b0>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a6391c>] (__schedule) from [<81a648b0>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:eae49d84 r9:00000002 r8:60000013 r7:829171a0 r6:eae49d8c r5:85df4800 r4:85df4800 [<81a64884>] (schedule) from [<81a64c98>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:85df4800 r4:8291719c [<81a64c80>] (schedule_preempt_disabled) from [<81a67848>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64c80>] (schedule_preempt_disabled) from [<81a67848>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a674f8>] (__mutex_lock.constprop.0) from [<81a67ff0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae49e08 r4:00000000 [<81a67fdc>] (__mutex_lock_slowpath) from [<81a68030>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a67ff4>] (mutex_lock) from [<804ea354>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85830240 r4:00000000 [<804edfc8>] (vfree) from [<80559050>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:85df4800 r7:00000000 r6:83018400 r5:00001000 r4:7f05f000 [<80559020>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:eab1d000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85ec178c r4:85e5aa80 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:85ec178c r4:85e5aa80 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85df4800 r8:85e5aaac r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:85e5aa80 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85e5aa80 r8:80278fec r7:eae41e60 r6:859af480 r5:85df4800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae49fb0 to 0xeae49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:859aa9c0 INFO: task kworker/0:311:6068 is blocked on a mutex likely owned by task kworker/1:179:4790. task:kworker/1:179 state:R running task stack:0 pid:4790 tgid:4790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6391c>] (__schedule) from [<81a64ce4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:85c68c00 r8:80200c04 r7:ea805d54 r6:ffffffff r5:85c68c00 r4:00000000 [<81a64ca4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea805d20 to 0xea805d68) 5d20: e43ea000 ebf3d000 00000001 80239bf8 7f039000 00000001 82acb1c4 82aca5a0 5d40: 7f039000 ebf3d000 8280c9b4 ea805d9c ea805da0 ea805d70 80230af0 80239c10 5d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea118>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e94>] (__purge_vmap_area_lazy) from [<804ea4d0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea805dc0 r5:ea805e08 r4:ea805dc0 [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e556c0 r4:00000000 [<804edfc8>] (vfree) from [<80559050>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:85c68c00 r7:00000000 r6:83018600 r5:00001000 r4:7f051000 [<80559020>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfa8b000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85c3378c r4:8598ff80 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:85c3378c r4:8598ff80 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85c68c00 r8:8598ffac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:8598ff80 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8598ff80 r8:80278fec r7:ea751e60 r6:8598f900 r5:85c68c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea805fb0 to 0xea805ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85926dc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:312:6071 blocked for more than 431 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:312 state:D stack:0 pid:6071 tgid:6071 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6391c>] (__schedule) from [<81a648b0>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a6391c>] (__schedule) from [<81a648b0>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:eae4dd84 r9:00000002 r8:60000013 r7:829171a0 r6:eae4dd8c r5:85df5400 r4:85df5400 [<81a64884>] (schedule) from [<81a64c98>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:85df5400 r4:8291719c [<81a64c80>] (schedule_preempt_disabled) from [<81a67848>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64c80>] (schedule_preempt_disabled) from [<81a67848>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a674f8>] (__mutex_lock.constprop.0) from [<81a67ff0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae4de08 r4:00000000 [<81a67fdc>] (__mutex_lock_slowpath) from [<81a68030>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a67ff4>] (mutex_lock) from [<804ea354>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85830cc0 r4:00000000 [<804edfc8>] (vfree) from [<80559050>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:85df5400 r7:00000000 r6:83018400 r5:00001000 r4:7f045000 [<80559020>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfc21000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85ec238c r4:85e5ad00 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:85ec238c r4:85e5ad00 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85df5400 r8:85e5ad2c r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:85e5ad00 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85e5ad00 r8:80278fec r7:eae45e60 r6:859af600 r5:85df5400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae4dfb0 to 0xeae4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85830780 INFO: task kworker/0:312:6071 is blocked on a mutex likely owned by task kworker/1:179:4790. task:kworker/1:179 state:R running task stack:0 pid:4790 tgid:4790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6391c>] (__schedule) from [<81a64ce4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:85c68c00 r8:80200c04 r7:ea805d54 r6:ffffffff r5:85c68c00 r4:00000000 [<81a64ca4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea805d20 to 0xea805d68) 5d20: e4800000 ebf3d000 00000001 80239bf8 7f039000 00000001 82acb1c4 82aca5a0 5d40: 7f039000 ebf3d000 8280c9b4 ea805d9c ea805da0 ea805d70 80230af0 80239c10 5d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea118>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e94>] (__purge_vmap_area_lazy) from [<804ea4d0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea805dc0 r5:ea805e08 r4:ea805dc0 [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e556c0 r4:00000000 [<804edfc8>] (vfree) from [<80559050>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:85c68c00 r7:00000000 r6:83018600 r5:00001000 r4:7f051000 [<80559020>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfa8b000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85c3378c r4:8598ff80 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:85c3378c r4:8598ff80 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85c68c00 r8:8598ffac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:8598ff80 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8598ff80 r8:80278fec r7:ea751e60 r6:8598f900 r5:85c68c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea805fb0 to 0xea805ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85926dc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:313:6072 blocked for more than 431 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:313 state:D stack:0 pid:6072 tgid:6072 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6391c>] (__schedule) from [<81a648b0>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a6391c>] (__schedule) from [<81a648b0>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:eae51d84 r9:00000002 r8:60000013 r7:829171a0 r6:eae51d8c r5:85df6000 r4:85df6000 [<81a64884>] (schedule) from [<81a64c98>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:85df6000 r4:8291719c [<81a64c80>] (schedule_preempt_disabled) from [<81a67848>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64c80>] (schedule_preempt_disabled) from [<81a67848>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a674f8>] (__mutex_lock.constprop.0) from [<81a67ff0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae51e08 r4:00000000 [<81a67fdc>] (__mutex_lock_slowpath) from [<81a68030>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a67ff4>] (mutex_lock) from [<804ea354>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85830a80 r4:00000000 [<804edfc8>] (vfree) from [<80559050>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:85df6000 r7:00000000 r6:83018400 r5:00001000 r4:7f03f000 [<80559020>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfab3000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85ec1f8c r4:85e5ac80 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:85ec1f8c r4:85e5ac80 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85df6000 r8:85e5acac r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:85e5ac80 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85e5ac80 r8:80278fec r7:eae4de60 r6:859af580 r5:85df6000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae51fb0 to 0xeae51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85830080 INFO: task kworker/0:313:6072 is blocked on a mutex likely owned by task kworker/1:179:4790. task:kworker/1:179 state:R running task stack:0 pid:4790 tgid:4790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6391c>] (__schedule) from [<81a64ce4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:85c68c00 r8:80200c04 r7:ea805d54 r6:ffffffff r5:85c68c00 r4:00000000 [<81a64ca4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea805d20 to 0xea805d68) 5d20: e4800000 ebf3d000 00000001 80239bf8 7f039000 00000001 82acb1c4 82aca5a0 5d40: 7f039000 ebf3d000 8280c9b4 ea805d9c ea805da0 ea805d70 80230af0 80239c10 5d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea118>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e94>] (__purge_vmap_area_lazy) from [<804ea4d0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea805dc0 r5:ea805e08 r4:ea805dc0 [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e556c0 r4:00000000 [<804edfc8>] (vfree) from [<80559050>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:85c68c00 r7:00000000 r6:83018600 r5:00001000 r4:7f051000 [<80559020>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfa8b000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85c3378c r4:8598ff80 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:85c3378c r4:8598ff80 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85c68c00 r8:8598ffac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:8598ff80 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8598ff80 r8:80278fec r7:ea751e60 r6:8598f900 r5:85c68c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea805fb0 to 0xea805ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85926dc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:314:6075 blocked for more than 431 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:314 state:D stack:0 pid:6075 tgid:6075 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6391c>] (__schedule) from [<81a648b0>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a6391c>] (__schedule) from [<81a648b0>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:eae55d84 r9:00000002 r8:60000113 r7:829171a0 r6:eae55d8c r5:85df6c00 r4:85df6c00 [<81a64884>] (schedule) from [<81a64c98>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:85df6c00 r4:8291719c [<81a64c80>] (schedule_preempt_disabled) from [<81a67848>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64c80>] (schedule_preempt_disabled) from [<81a67848>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a674f8>] (__mutex_lock.constprop.0) from [<81a67ff0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae55e08 r4:00000000 [<81a67fdc>] (__mutex_lock_slowpath) from [<81a68030>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a67ff4>] (mutex_lock) from [<804ea354>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85830f00 r4:00000000 [<804edfc8>] (vfree) from [<80559050>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:85df6c00 r7:00000000 r6:83018400 r5:00001000 r4:7f047000 [<80559020>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea325000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85ec278c r4:85e5ac00 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:85ec278c r4:85e5ac00 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85df6c00 r8:85e5ac2c r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:85e5ac00 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85e5ac00 r8:80278fec r7:eae4de60 r6:859af500 r5:85df6c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae55fb0 to 0xeae55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85830b80 INFO: task kworker/0:314:6075 is blocked on a mutex likely owned by task kworker/1:179:4790. task:kworker/1:179 state:R running task stack:0 pid:4790 tgid:4790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6391c>] (__schedule) from [<81a64ce4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:85c68c00 r8:80200c04 r7:ea805d54 r6:ffffffff r5:85c68c00 r4:00000000 [<81a64ca4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea805d20 to 0xea805d68) 5d20: e4aab000 ebf3d000 00000001 80239bf8 7f039000 00000001 82acb1c4 82aca5a0 5d40: 7f039000 ebf3d000 8280c9b4 ea805d9c ea805da0 ea805d70 80230af0 80239c10 5d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea118>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e94>] (__purge_vmap_area_lazy) from [<804ea4d0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea805dc0 r5:ea805e08 r4:ea805dc0 [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e556c0 r4:00000000 [<804edfc8>] (vfree) from [<80559050>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:85c68c00 r7:00000000 r6:83018600 r5:00001000 r4:7f051000 [<80559020>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfa8b000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85c3378c r4:8598ff80 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:85c3378c r4:8598ff80 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85c68c00 r8:8598ffac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:8598ff80 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8598ff80 r8:80278fec r7:ea751e60 r6:8598f900 r5:85c68c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea805fb0 to 0xea805ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85926dc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:315:6076 blocked for more than 431 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:315 state:D stack:0 pid:6076 tgid:6076 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6391c>] (__schedule) from [<81a648b0>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a6391c>] (__schedule) from [<81a648b0>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:eae65d84 r9:00000002 r8:60000013 r7:829171a0 r6:eae65d8c r5:85df3000 r4:85df3000 [<81a64884>] (schedule) from [<81a64c98>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:85df3000 r4:8291719c [<81a64c80>] (schedule_preempt_disabled) from [<81a67848>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64c80>] (schedule_preempt_disabled) from [<81a67848>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a674f8>] (__mutex_lock.constprop.0) from [<81a67ff0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae65e08 r4:00000000 [<81a67fdc>] (__mutex_lock_slowpath) from [<81a68030>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a67ff4>] (mutex_lock) from [<804ea354>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587d000 r4:00000000 [<804edfc8>] (vfree) from [<80559050>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:85df3000 r7:00000000 r6:83018400 r5:00001000 r4:7f04f000 [<80559020>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea5f5000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85ec2f8c r4:85e5ab80 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:85ec2f8c r4:85e5ab80 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85df3000 r8:85e5abac r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:85e5ab80 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85e5ab80 r8:80278fec r7:eae55e60 r6:859aff80 r5:85df3000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae65fb0 to 0xeae65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85830080 INFO: task kworker/0:315:6076 is blocked on a mutex likely owned by task kworker/1:179:4790. task:kworker/1:179 state:R running task stack:0 pid:4790 tgid:4790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6391c>] (__schedule) from [<81a64ce4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:85c68c00 r8:80200c04 r7:ea805d54 r6:ffffffff r5:85c68c00 r4:00000000 [<81a64ca4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea805d20 to 0xea805d68) 5d20: e4d3c000 ebf3d000 00000001 80239bf8 7f039000 00000001 82acb1c4 82aca5a0 5d40: 7f039000 ebf3d000 8280c9b4 ea805d9c ea805da0 ea805d70 80230af0 80239c10 5d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea118>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e94>] (__purge_vmap_area_lazy) from [<804ea4d0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea805dc0 r5:ea805e08 r4:ea805dc0 [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e556c0 r4:00000000 [<804edfc8>] (vfree) from [<80559050>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:85c68c00 r7:00000000 r6:83018600 r5:00001000 r4:7f051000 [<80559020>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfa8b000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85c3378c r4:8598ff80 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:85c3378c r4:8598ff80 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85c68c00 r8:8598ffac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:8598ff80 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8598ff80 r8:80278fec r7:ea751e60 r6:8598f900 r5:85c68c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea805fb0 to 0xea805ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85926dc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:316:6079 blocked for more than 431 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:316 state:D stack:0 pid:6079 tgid:6079 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6391c>] (__schedule) from [<81a648b0>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a6391c>] (__schedule) from [<81a648b0>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:eae69d84 r9:00000002 r8:60000113 r7:829171a0 r6:eae69d8c r5:85581800 r4:85581800 [<81a64884>] (schedule) from [<81a64c98>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:85581800 r4:8291719c [<81a64c80>] (schedule_preempt_disabled) from [<81a67848>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64c80>] (schedule_preempt_disabled) from [<81a67848>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a674f8>] (__mutex_lock.constprop.0) from [<81a67ff0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae69e08 r4:00000000 [<81a67fdc>] (__mutex_lock_slowpath) from [<81a68030>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a67ff4>] (mutex_lock) from [<804ea354>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859aa9c0 r4:00000000 [<804edfc8>] (vfree) from [<80559050>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:85581800 r7:00000000 r6:83018400 r5:00001000 r4:7f04d000 [<80559020>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea427000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85ec2b8c r4:85e5ab00 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:85ec2b8c r4:85e5ab00 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85581800 r8:85e5ab2c r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:85e5ab00 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85e5ab00 r8:80278fec r7:eae65e60 r6:85e5ad80 r5:85581800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae69fb0 to 0xeae69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85830a00 INFO: task kworker/0:316:6079 is blocked on a mutex likely owned by task kworker/1:179:4790. task:kworker/1:179 state:R running task stack:0 pid:4790 tgid:4790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6391c>] (__schedule) from [<81a64ce4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:85c68c00 r8:80200c04 r7:ea805d54 r6:ffffffff r5:85c68c00 r4:00000000 [<81a64ca4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea805d20 to 0xea805d68) 5d20: e4ff8000 ebf3d000 00000001 80239bf8 7f039000 00000001 82acb1c4 82aca5a0 5d40: 7f039000 ebf3d000 8280c9b4 ea805d9c ea805da0 ea805d70 80230af0 80239c10 5d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea118>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e94>] (__purge_vmap_area_lazy) from [<804ea4d0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea805dc0 r5:ea805e08 r4:ea805dc0 [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e556c0 r4:00000000 [<804edfc8>] (vfree) from [<80559050>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:85c68c00 r7:00000000 r6:83018600 r5:00001000 r4:7f051000 [<80559020>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfa8b000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85c3378c r4:8598ff80 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:85c3378c r4:8598ff80 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85c68c00 r8:8598ffac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:8598ff80 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8598ff80 r8:80278fec r7:ea751e60 r6:8598f900 r5:85c68c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea805fb0 to 0xea805ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85926dc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:317:6082 blocked for more than 431 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:317 state:D stack:0 pid:6082 tgid:6082 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6391c>] (__schedule) from [<81a648b0>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a6391c>] (__schedule) from [<81a648b0>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:eae6dd84 r9:00000002 r8:60000113 r7:829171a0 r6:eae6dd8c r5:85583c00 r4:85583c00 [<81a64884>] (schedule) from [<81a64c98>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:85583c00 r4:8291719c [<81a64c80>] (schedule_preempt_disabled) from [<81a67848>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64c80>] (schedule_preempt_disabled) from [<81a67848>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a674f8>] (__mutex_lock.constprop.0) from [<81a67ff0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae6de08 r4:00000000 [<81a67fdc>] (__mutex_lock_slowpath) from [<81a68030>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a67ff4>] (mutex_lock) from [<804ea354>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848dc1c0 r4:00000000 [<804edfc8>] (vfree) from [<80559050>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:85583c00 r7:00000000 r6:83018400 r5:00001000 r4:7f05b000 [<80559020>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea715000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85ec338c r4:85e5ae80 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:85ec338c r4:85e5ae80 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85583c00 r8:85e5aeac r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:85e5ae80 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85e5ae80 r8:80278fec r7:eae65e60 r6:85e5af00 r5:85583c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae6dfb0 to 0xeae6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:857f6280 INFO: task kworker/0:317:6082 is blocked on a mutex likely owned by task kworker/1:179:4790. task:kworker/1:179 state:R running task stack:0 pid:4790 tgid:4790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6391c>] (__schedule) from [<81a64ce4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:85c68c00 r8:80200c04 r7:ea805d54 r6:ffffffff r5:85c68c00 r4:00000000 [<81a64ca4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea805d20 to 0xea805d68) 5d20: e4ff8000 ebf3d000 00000001 80239bf8 7f039000 00000001 82acb1c4 82aca5a0 5d40: 7f039000 ebf3d000 8280c9b4 ea805d9c ea805da0 ea805d70 80230af0 80239c10 5d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea118>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e94>] (__purge_vmap_area_lazy) from [<804ea4d0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea805dc0 r5:ea805e08 r4:ea805dc0 [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e556c0 r4:00000000 [<804edfc8>] (vfree) from [<80559050>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:85c68c00 r7:00000000 r6:83018600 r5:00001000 r4:7f051000 [<80559020>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfa8b000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85c3378c r4:8598ff80 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:85c3378c r4:8598ff80 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85c68c00 r8:8598ffac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:8598ff80 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8598ff80 r8:80278fec r7:ea751e60 r6:8598f900 r5:85c68c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea805fb0 to 0xea805ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85926dc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 30 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT Hardware name: ARM-Versatile Express Call trace: [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c arch/arm/kernel/traps.c:257) r7:00000000 r6:00070013 r5:60070093 r4:82252568 [<80201b08>] (show_stack) from [<8021f8b0>] (__dump_stack lib/dump_stack.c:94 [inline]) [<80201b08>] (show_stack) from [<8021f8b0>] (dump_stack_lvl+0x70/0x7c lib/dump_stack.c:120) [<8021f840>] (dump_stack_lvl) from [<8021f8d4>] (dump_stack+0x18/0x1c lib/dump_stack.c:129) r5:00000001 r4:00000001 [<8021f8bc>] (dump_stack) from [<81a4d534>] (nmi_cpu_backtrace+0x160/0x17c lib/nmi_backtrace.c:113) [<81a4d3d4>] (nmi_cpu_backtrace) from [<81a4d680>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8 lib/nmi_backtrace.c:62) r7:00000001 r6:8280c690 r5:8281ae34 r4:ffffffff [<81a4d550>] (nmi_trigger_cpumask_backtrace) from [<802304fc>] (arch_trigger_cpumask_backtrace+0x18/0x1c arch/arm/kernel/smp.c:852) r9:8281ba28 r8:8280c810 r7:000299e9 r6:00007ba5 r5:82abf7d4 r4:8617ec0c [<802304e4>] (arch_trigger_cpumask_backtrace) from [<8037fb08>] (trigger_all_cpu_backtrace include/linux/nmi.h:160 [inline]) [<802304e4>] (arch_trigger_cpumask_backtrace) from [<8037fb08>] (check_hung_uninterruptible_tasks kernel/hung_task.c:332 [inline]) [<802304e4>] (arch_trigger_cpumask_backtrace) from [<8037fb08>] (watchdog+0x5d0/0x850 kernel/hung_task.c:495) [<8037f538>] (watchdog) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:00000000 r8:8037f538 r7:83844000 r6:83844000 r5:832e2400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf8d9fb0 to 0xdf8d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:833c8940 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 2821 Comm: pr/ttyAMA-1 Not tainted syzkaller #0 PREEMPT Hardware name: ARM-Versatile Express PC is at __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:152 [inline] PC is at _raw_spin_unlock_irqrestore+0x28/0x54 kernel/locking/spinlock.c:194 LR is at spin_unlock_irqrestore include/linux/spinlock.h:406 [inline] LR is at __uart_port_unlock_irqrestore include/linux/serial_core.h:616 [inline] LR is at pl011_console_device_unlock+0x20/0x24 drivers/tty/serial/amba-pl011.c:2603 pc : [<81a6d784>] lr : [<80a8f308>] psr: 60000113 sp : eafc1eb0 ip : eafc1ec0 fp : eafc1ebc r10: 82959594 r9 : 00000000 r8 : 00000000 r7 : 00000117 r6 : 829594f8 r5 : 00000000 r4 : 00000001 r3 : 00000f0d r2 : 00000000 r1 : 60000113 r0 : 84b9c840 Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user Control: 30c5387d Table: 85b29180 DAC: fffffffd Call trace: [<81a6d75c>] (_raw_spin_unlock_irqrestore) from [<80a8f308>] (spin_unlock_irqrestore include/linux/spinlock.h:406 [inline]) [<81a6d75c>] (_raw_spin_unlock_irqrestore) from [<80a8f308>] (__uart_port_unlock_irqrestore include/linux/serial_core.h:616 [inline]) [<81a6d75c>] (_raw_spin_unlock_irqrestore) from [<80a8f308>] (pl011_console_device_unlock+0x20/0x24 drivers/tty/serial/amba-pl011.c:2603) [<80a8f2e8>] (pl011_console_device_unlock) from [<802e3768>] (nbcon_emit_one+0x88/0x100 kernel/printk/nbcon.c:1142) [<802e36e0>] (nbcon_emit_one) from [<802e3988>] (nbcon_kthread_func+0x1a8/0x2a4 kernel/printk/nbcon.c:1229) r6:8280c690 r5:84210c00 r4:829594f8 [<802e37e0>] (nbcon_kthread_func) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:829594f8 r8:802e37e0 r7:84a4f000 r6:84a4f000 r5:84210c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafc1fb0 to 0xeafc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:84a38640