INFO: task kworker/0:7:12275 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:7 state:D stack:0 pid:12275 tgid:12275 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63234>] (__schedule) from [<81a641c8>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a63234>] (__schedule) from [<81a641c8>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:df989d84 r9:00000002 r8:60000013 r7:829171a0 r6:df989d8c r5:83a73000 r4:83a73000 [<81a6419c>] (schedule) from [<81a645b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:83a73000 r4:8291719c [<81a64598>] (schedule_preempt_disabled) from [<81a67160>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64598>] (schedule_preempt_disabled) from [<81a67160>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a66e10>] (__mutex_lock.constprop.0) from [<81a67908>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df989e08 r4:00000000 [<81a678f4>] (__mutex_lock_slowpath) from [<81a67948>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a6790c>] (mutex_lock) from [<804e9e3c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859e88c0 r4:00000000 [<804edab0>] (vfree) from [<80558908>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:83a73000 r7:00000000 r6:83018400 r5:00001000 r4:7f2ac000 [<805588d8>] (execmem_free) from [<803c5e38>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ebcd4000 [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c61b0>] (bpf_jit_free) from [<803c72c0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85b7638c r4:854e0c80 [<803c7180>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:85b7638c r4:854e0c80 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:83a73000 r8:854e0cac r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:854e0c80 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:854e0c80 r8:80278fec r7:dfa31e60 r6:854e0680 r5:83a73000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf989fb0 to 0xdf989ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:84ce9480 INFO: task kworker/0:7:12275 is blocked on a mutex likely owned by task kworker/1:41:15590. task:kworker/1:41 state:R running task stack:0 pid:15590 tgid:15590 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63234>] (__schedule) from [<81a645fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:863c3000 r8:80200c04 r7:ebb85d54 r6:ffffffff r5:863c3000 r4:00000000 [<81a645bc>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xebb85d20 to 0xebb85d68) 5d20: d1a7b000 ea7df000 00000001 80239bf8 7f246000 00000001 82acb1c4 82aca5a0 5d40: 7f246000 ea7df000 8280c9b4 ebb85d9c ebb85da0 ebb85d70 80230af0 80239c10 5d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804e9c00>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e997c>] (__purge_vmap_area_lazy) from [<804e9fb8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ebb85dc0 r5:ebb85e08 r4:ebb85dc0 [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8593dbc0 r4:00000000 [<804edab0>] (vfree) from [<80558908>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:863c3000 r7:00000000 r6:83018600 r5:00001000 r4:7f24a000 [<805588d8>] (execmem_free) from [<803c5e38>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfbb1000 [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c61b0>] (bpf_jit_free) from [<803c72c0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:8559178c r4:84904800 [<803c7180>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:8559178c r4:84904800 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:863c3000 r8:8490482c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:84904800 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84904800 r8:80278fec r7:ebb51e60 r6:84904080 r5:863c3000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb85fb0 to 0xebb85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:858c4c40 INFO: task kworker/0:2:15615 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:2 state:D stack:0 pid:15615 tgid:15615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63234>] (__schedule) from [<81a641c8>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a63234>] (__schedule) from [<81a641c8>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ebacdd84 r9:00000002 r8:60000113 r7:829171a0 r6:ebacdd8c r5:83b7bc00 r4:83b7bc00 [<81a6419c>] (schedule) from [<81a645b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:83b7bc00 r4:8291719c [<81a64598>] (schedule_preempt_disabled) from [<81a67160>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64598>] (schedule_preempt_disabled) from [<81a67160>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a66e10>] (__mutex_lock.constprop.0) from [<81a67908>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebacde08 r4:00000000 [<81a678f4>] (__mutex_lock_slowpath) from [<81a67948>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a6790c>] (mutex_lock) from [<804e9e3c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e6d500 r4:00000000 [<804edab0>] (vfree) from [<80558908>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:83b7bc00 r7:00000000 r6:83018400 r5:00001000 r4:7f2aa000 [<805588d8>] (execmem_free) from [<803c5e38>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ebc81000 [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c61b0>] (bpf_jit_free) from [<803c72c0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:8601138c r4:85881b00 [<803c7180>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:8601138c r4:85881b00 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:83b7bc00 r8:85881b2c r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:85881b00 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85881b00 r8:80278fec r7:df989e60 r6:85881c80 r5:83b7bc00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebacdfb0 to 0xebacdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85971f40 INFO: task kworker/0:2:15615 is blocked on a mutex likely owned by task kworker/1:41:15590. task:kworker/1:41 state:R running task stack:0 pid:15590 tgid:15590 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63234>] (__schedule) from [<81a645fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:863c3000 r8:80200c04 r7:ebb85d54 r6:ffffffff r5:863c3000 r4:00000000 [<81a645bc>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xebb85d20 to 0xebb85d68) 5d20: d1f84000 ea7df000 00000001 80239bf8 7f246000 00000001 82acb1c4 82aca5a0 5d40: 7f246000 ea7df000 8280c9b4 ebb85d9c ebb85da0 ebb85d70 80230af0 80239c10 5d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804e9c00>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e997c>] (__purge_vmap_area_lazy) from [<804e9fb8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ebb85dc0 r5:ebb85e08 r4:ebb85dc0 [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8593dbc0 r4:00000000 [<804edab0>] (vfree) from [<80558908>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:863c3000 r7:00000000 r6:83018600 r5:00001000 r4:7f24a000 [<805588d8>] (execmem_free) from [<803c5e38>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfbb1000 [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c61b0>] (bpf_jit_free) from [<803c72c0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:8559178c r4:84904800 [<803c7180>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:8559178c r4:84904800 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:863c3000 r8:8490482c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:84904800 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84904800 r8:80278fec r7:ebb51e60 r6:84904080 r5:863c3000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb85fb0 to 0xebb85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:858c4c40 INFO: task kworker/1:44:15653 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:44 state:D stack:0 pid:15653 tgid:15653 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63234>] (__schedule) from [<81a641c8>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a63234>] (__schedule) from [<81a641c8>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:dfb6dd84 r9:00000002 r8:60000113 r7:829171a0 r6:dfb6dd8c r5:84f59800 r4:84f59800 [<81a6419c>] (schedule) from [<81a645b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:84f59800 r4:8291719c [<81a64598>] (schedule_preempt_disabled) from [<81a67160>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64598>] (schedule_preempt_disabled) from [<81a67160>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a66e10>] (__mutex_lock.constprop.0) from [<81a67908>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb6de08 r4:00000000 [<81a678f4>] (__mutex_lock_slowpath) from [<81a67948>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a6790c>] (mutex_lock) from [<804e9e3c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84985b00 r4:00000000 [<804edab0>] (vfree) from [<80558908>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84f59800 r7:00000000 r6:83018600 r5:00001000 r4:7f242000 [<805588d8>] (execmem_free) from [<803c5e38>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfb00000 [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c61b0>] (bpf_jit_free) from [<803c72c0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85f62f8c r4:84e91880 [<803c7180>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:85f62f8c r4:84e91880 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84f59800 r8:84e918ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:84e91880 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84e91880 r8:80278fec r7:ebb85e60 r6:84e91c80 r5:84f59800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb6dfb0 to 0xdfb6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:8593d540 INFO: task kworker/1:44:15653 is blocked on a mutex likely owned by task kworker/1:41:15590. task:kworker/1:41 state:R running task stack:0 pid:15590 tgid:15590 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63234>] (__schedule) from [<81a645fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:863c3000 r8:80200c04 r7:ebb85d54 r6:ffffffff r5:863c3000 r4:00000000 [<81a645bc>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xebb85d20 to 0xebb85d68) 5d20: d4638000 ea7df000 00000001 80239bf8 7f246000 00000001 82acb1c4 82aca5a0 5d40: 7f246000 ea7df000 8280c9b4 ebb85d9c ebb85da0 ebb85d70 80230af0 80239c10 5d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804e9c00>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e997c>] (__purge_vmap_area_lazy) from [<804e9fb8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ebb85dc0 r5:ebb85e08 r4:ebb85dc0 [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8593dbc0 r4:00000000 [<804edab0>] (vfree) from [<80558908>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:863c3000 r7:00000000 r6:83018600 r5:00001000 r4:7f24a000 [<805588d8>] (execmem_free) from [<803c5e38>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfbb1000 [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c61b0>] (bpf_jit_free) from [<803c72c0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:8559178c r4:84904800 [<803c7180>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:8559178c r4:84904800 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:863c3000 r8:8490482c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:84904800 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84904800 r8:80278fec r7:ebb51e60 r6:84904080 r5:863c3000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb85fb0 to 0xebb85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:858c4c40 INFO: task kworker/1:45:15654 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:45 state:D stack:0 pid:15654 tgid:15654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63234>] (__schedule) from [<81a641c8>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a63234>] (__schedule) from [<81a641c8>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:dfbd1d84 r9:00000002 r8:60000113 r7:829171a0 r6:dfbd1d8c r5:84f5d400 r4:84f5d400 [<81a6419c>] (schedule) from [<81a645b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:84f5d400 r4:8291719c [<81a64598>] (schedule_preempt_disabled) from [<81a67160>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64598>] (schedule_preempt_disabled) from [<81a67160>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a66e10>] (__mutex_lock.constprop.0) from [<81a67908>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbd1e08 r4:00000000 [<81a678f4>] (__mutex_lock_slowpath) from [<81a67948>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a6790c>] (mutex_lock) from [<804e9e3c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854fdc00 r4:00000000 [<804edab0>] (vfree) from [<80558908>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84f5d400 r7:00000000 r6:83018600 r5:00001000 r4:7f248000 [<805588d8>] (execmem_free) from [<803c5e38>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfba7000 [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c61b0>] (bpf_jit_free) from [<803c72c0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:8559138c r4:84e91e00 [<803c7180>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:8559138c r4:84e91e00 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84f5d400 r8:84e91e2c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:84e91e00 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84e91e00 r8:80278fec r7:dfb6de60 r6:85420000 r5:84f5d400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbd1fb0 to 0xdfbd1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:8593d540 INFO: task kworker/1:45:15654 is blocked on a mutex likely owned by task kworker/1:41:15590. task:kworker/1:41 state:R running task stack:0 pid:15590 tgid:15590 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63234>] (__schedule) from [<81a645fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:863c3000 r8:80200c04 r7:ebb85d54 r6:ffffffff r5:863c3000 r4:00000000 [<81a645bc>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xebb85d20 to 0xebb85d68) 5d20: d654e000 ea7df000 00000001 80239bf8 7f246000 00000001 82acb1c4 82aca5a0 5d40: 7f246000 ea7df000 8280c9b4 ebb85d9c ebb85da0 ebb85d70 80230af0 80239c10 5d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804e9c00>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e997c>] (__purge_vmap_area_lazy) from [<804e9fb8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ebb85dc0 r5:ebb85e08 r4:ebb85dc0 [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8593dbc0 r4:00000000 [<804edab0>] (vfree) from [<80558908>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:863c3000 r7:00000000 r6:83018600 r5:00001000 r4:7f24a000 [<805588d8>] (execmem_free) from [<803c5e38>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfbb1000 [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c61b0>] (bpf_jit_free) from [<803c72c0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:8559178c r4:84904800 [<803c7180>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:8559178c r4:84904800 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:863c3000 r8:8490482c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:84904800 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84904800 r8:80278fec r7:ebb51e60 r6:84904080 r5:863c3000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb85fb0 to 0xebb85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:858c4c40 INFO: task kworker/1:46:15655 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:46 state:D stack:0 pid:15655 tgid:15655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63234>] (__schedule) from [<81a641c8>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a63234>] (__schedule) from [<81a641c8>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:dfbddd84 r9:00000002 r8:60000113 r7:829171a0 r6:dfbddd8c r5:84f58000 r4:84f58000 [<81a6419c>] (schedule) from [<81a645b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:84f58000 r4:8291719c [<81a64598>] (schedule_preempt_disabled) from [<81a67160>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64598>] (schedule_preempt_disabled) from [<81a67160>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a66e10>] (__mutex_lock.constprop.0) from [<81a67908>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbdde08 r4:00000000 [<81a678f4>] (__mutex_lock_slowpath) from [<81a67948>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a6790c>] (mutex_lock) from [<804e9e3c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a41b80 r4:00000000 [<804edab0>] (vfree) from [<80558908>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84f58000 r7:00000000 r6:83018600 r5:00001000 r4:7f288000 [<805588d8>] (execmem_free) from [<803c5e38>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfc37000 [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c61b0>] (bpf_jit_free) from [<803c72c0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85592f8c r4:85420300 [<803c7180>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:85592f8c r4:85420300 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84f58000 r8:8542032c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85420300 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85420300 r8:80278fec r7:dfb6de60 r6:85420400 r5:84f58000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbddfb0 to 0xdfbddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:8590dd40 INFO: task kworker/1:46:15655 is blocked on a mutex likely owned by task kworker/1:41:15590. task:kworker/1:41 state:R running task stack:0 pid:15590 tgid:15590 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63234>] (__schedule) from [<81a645fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:863c3000 r8:80200c04 r7:ebb85d54 r6:ffffffff r5:863c3000 r4:00000000 [<81a645bc>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xebb85d20 to 0xebb85d68) 5d20: d65a0000 ea7df000 00000001 80239bf8 7f246000 00000001 82acb1c4 82aca5a0 5d40: 7f246000 ea7df000 8280c9b4 ebb85d9c ebb85da0 ebb85d70 80230af0 80239c10 5d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804e9c00>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e997c>] (__purge_vmap_area_lazy) from [<804e9fb8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ebb85dc0 r5:ebb85e08 r4:ebb85dc0 [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8593dbc0 r4:00000000 [<804edab0>] (vfree) from [<80558908>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:863c3000 r7:00000000 r6:83018600 r5:00001000 r4:7f24a000 [<805588d8>] (execmem_free) from [<803c5e38>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfbb1000 [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c61b0>] (bpf_jit_free) from [<803c72c0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:8559178c r4:84904800 [<803c7180>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:8559178c r4:84904800 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:863c3000 r8:8490482c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:84904800 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84904800 r8:80278fec r7:ebb51e60 r6:84904080 r5:863c3000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb85fb0 to 0xebb85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:858c4c40 INFO: task kworker/1:47:15661 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:47 state:D stack:0 pid:15661 tgid:15661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63234>] (__schedule) from [<81a641c8>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a63234>] (__schedule) from [<81a641c8>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:eb8cdd84 r9:00000002 r8:60010013 r7:829171a0 r6:eb8cdd8c r5:84b16000 r4:84b16000 [<81a6419c>] (schedule) from [<81a645b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:84b16000 r4:8291719c [<81a64598>] (schedule_preempt_disabled) from [<81a67160>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64598>] (schedule_preempt_disabled) from [<81a67160>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a66e10>] (__mutex_lock.constprop.0) from [<81a67908>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8cde08 r4:00000000 [<81a678f4>] (__mutex_lock_slowpath) from [<81a67948>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a6790c>] (mutex_lock) from [<804e9e3c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8595c400 r4:00000000 [<804edab0>] (vfree) from [<80558908>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84b16000 r7:00000000 r6:83018600 r5:00001000 r4:7f29a000 [<805588d8>] (execmem_free) from [<803c5e38>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea3a9000 [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c61b0>] (bpf_jit_free) from [<803c72c0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84dbbf8c r4:85420b00 [<803c7180>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84dbbf8c r4:85420b00 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84b16000 r8:85420b2c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85420b00 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85420b00 r8:80278fec r7:dfbdde60 r6:85420d80 r5:84b16000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8cdfb0 to 0xeb8cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85977fc0 INFO: task kworker/1:47:15661 is blocked on a mutex likely owned by task kworker/1:41:15590. task:kworker/1:41 state:R running task stack:0 pid:15590 tgid:15590 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63234>] (__schedule) from [<81a645fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:863c3000 r8:80200c04 r7:ebb85d54 r6:ffffffff r5:863c3000 r4:00000000 [<81a645bc>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xebb85d20 to 0xebb85d68) 5d20: d6975000 ea7df000 00000001 80239bf8 7f246000 00000001 82acb1c4 82aca5a0 5d40: 7f246000 ea7df000 8280c9b4 ebb85d9c ebb85da0 ebb85d70 80230af0 80239c10 5d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804e9c00>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e997c>] (__purge_vmap_area_lazy) from [<804e9fb8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ebb85dc0 r5:ebb85e08 r4:ebb85dc0 [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8593dbc0 r4:00000000 [<804edab0>] (vfree) from [<80558908>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:863c3000 r7:00000000 r6:83018600 r5:00001000 r4:7f24a000 [<805588d8>] (execmem_free) from [<803c5e38>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfbb1000 [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c61b0>] (bpf_jit_free) from [<803c72c0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:8559178c r4:84904800 [<803c7180>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:8559178c r4:84904800 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:863c3000 r8:8490482c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:84904800 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84904800 r8:80278fec r7:ebb51e60 r6:84904080 r5:863c3000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb85fb0 to 0xebb85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:858c4c40 INFO: task kworker/1:48:15666 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:48 state:D stack:0 pid:15666 tgid:15666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63234>] (__schedule) from [<81a641c8>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a63234>] (__schedule) from [<81a641c8>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:eb965d84 r9:00000002 r8:60010113 r7:829171a0 r6:eb965d8c r5:84b10c00 r4:84b10c00 [<81a6419c>] (schedule) from [<81a645b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:84b10c00 r4:8291719c [<81a64598>] (schedule_preempt_disabled) from [<81a67160>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64598>] (schedule_preempt_disabled) from [<81a67160>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a66e10>] (__mutex_lock.constprop.0) from [<81a67908>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb965e08 r4:00000000 [<81a678f4>] (__mutex_lock_slowpath) from [<81a67948>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a6790c>] (mutex_lock) from [<804e9e3c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:833943c0 r4:00000000 [<804edab0>] (vfree) from [<80558908>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84b10c00 r7:00000000 r6:83018600 r5:00001000 r4:7f28a000 [<805588d8>] (execmem_free) from [<803c5e38>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dff63000 [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c61b0>] (bpf_jit_free) from [<803c72c0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:8559338c r4:85420180 [<803c7180>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:8559338c r4:85420180 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84b10c00 r8:854201ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85420180 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85420180 r8:80278fec r7:eb8cde60 r6:85420500 r5:84b10c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb965fb0 to 0xeb965ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85a41900 INFO: task kworker/1:48:15666 is blocked on a mutex likely owned by task kworker/1:41:15590. task:kworker/1:41 state:R running task stack:0 pid:15590 tgid:15590 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63234>] (__schedule) from [<81a645fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:863c3000 r8:80200c04 r7:ebb85d54 r6:ffffffff r5:863c3000 r4:00000000 [<81a645bc>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xebb85d20 to 0xebb85d68) 5d20: d6975000 ea7df000 00000001 80239bf8 7f246000 00000001 82acb1c4 82aca5a0 5d40: 7f246000 ea7df000 8280c9b4 ebb85d9c ebb85da0 ebb85d70 80230af0 80239c10 5d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804e9c00>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e997c>] (__purge_vmap_area_lazy) from [<804e9fb8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ebb85dc0 r5:ebb85e08 r4:ebb85dc0 [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8593dbc0 r4:00000000 [<804edab0>] (vfree) from [<80558908>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:863c3000 r7:00000000 r6:83018600 r5:00001000 r4:7f24a000 [<805588d8>] (execmem_free) from [<803c5e38>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfbb1000 [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c61b0>] (bpf_jit_free) from [<803c72c0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:8559178c r4:84904800 [<803c7180>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:8559178c r4:84904800 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:863c3000 r8:8490482c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:84904800 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84904800 r8:80278fec r7:ebb51e60 r6:84904080 r5:863c3000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb85fb0 to 0xebb85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:858c4c40 INFO: task kworker/1:49:15668 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:49 state:D stack:0 pid:15668 tgid:15668 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63234>] (__schedule) from [<81a641c8>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a63234>] (__schedule) from [<81a641c8>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:dfb09d84 r9:00000002 r8:60010013 r7:829171a0 r6:dfb09d8c r5:84b15400 r4:84b15400 [<81a6419c>] (schedule) from [<81a645b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:84b15400 r4:8291719c [<81a64598>] (schedule_preempt_disabled) from [<81a67160>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64598>] (schedule_preempt_disabled) from [<81a67160>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a66e10>] (__mutex_lock.constprop.0) from [<81a67908>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb09e08 r4:00000000 [<81a678f4>] (__mutex_lock_slowpath) from [<81a67948>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a6790c>] (mutex_lock) from [<804e9e3c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8599ec40 r4:00000000 [<804edab0>] (vfree) from [<80558908>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84b15400 r7:00000000 r6:83018600 r5:00001000 r4:7f24c000 [<805588d8>] (execmem_free) from [<803c5e38>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfbcd000 [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c61b0>] (bpf_jit_free) from [<803c72c0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85591b8c r4:85420600 [<803c7180>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:85591b8c r4:85420600 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84b15400 r8:8542062c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85420600 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85420600 r8:80278fec r7:eb8cde60 r6:85420a00 r5:84b15400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb09fb0 to 0xdfb09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85903c00 INFO: task kworker/1:49:15668 is blocked on a mutex likely owned by task kworker/1:41:15590. task:kworker/1:41 state:R running task stack:0 pid:15590 tgid:15590 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63234>] (__schedule) from [<81a645fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:863c3000 r8:80200c04 r7:ebb85d54 r6:ffffffff r5:863c3000 r4:00000000 [<81a645bc>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xebb85d20 to 0xebb85d68) 5d20: d7015000 ea7df000 00000001 80239bf8 7f246000 00000001 82acb1c4 82aca5a0 5d40: 7f246000 ea7df000 8280c9b4 ebb85d9c ebb85da0 ebb85d70 80230af0 80239c10 5d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804e9c00>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e997c>] (__purge_vmap_area_lazy) from [<804e9fb8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ebb85dc0 r5:ebb85e08 r4:ebb85dc0 [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8593dbc0 r4:00000000 [<804edab0>] (vfree) from [<80558908>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:863c3000 r7:00000000 r6:83018600 r5:00001000 r4:7f24a000 [<805588d8>] (execmem_free) from [<803c5e38>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfbb1000 [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c61b0>] (bpf_jit_free) from [<803c72c0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:8559178c r4:84904800 [<803c7180>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:8559178c r4:84904800 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:863c3000 r8:8490482c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:84904800 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84904800 r8:80278fec r7:ebb51e60 r6:84904080 r5:863c3000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb85fb0 to 0xebb85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:858c4c40 INFO: task kworker/1:50:15672 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:50 state:D stack:0 pid:15672 tgid:15672 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63234>] (__schedule) from [<81a641c8>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a63234>] (__schedule) from [<81a641c8>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:dffddd84 r9:00000002 r8:60000113 r7:829171a0 r6:dffddd8c r5:84b14800 r4:84b14800 [<81a6419c>] (schedule) from [<81a645b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:84b14800 r4:8291719c [<81a64598>] (schedule_preempt_disabled) from [<81a67160>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64598>] (schedule_preempt_disabled) from [<81a67160>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a66e10>] (__mutex_lock.constprop.0) from [<81a67908>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffdde08 r4:00000000 [<81a678f4>] (__mutex_lock_slowpath) from [<81a67948>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a6790c>] (mutex_lock) from [<804e9e3c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b952c0 r4:00000000 [<804edab0>] (vfree) from [<80558908>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84b14800 r7:00000000 r6:83018600 r5:00001000 r4:7f28c000 [<805588d8>] (execmem_free) from [<803c5e38>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dffd3000 [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c61b0>] (bpf_jit_free) from [<803c72c0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85593b8c r4:85420080 [<803c7180>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:85593b8c r4:85420080 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84b14800 r8:854200ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85420080 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85420080 r8:80278fec r7:eb8cde60 r6:85420900 r5:84b14800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffddfb0 to 0xdffddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:84b95dc0 INFO: task kworker/1:50:15672 is blocked on a mutex likely owned by task kworker/1:41:15590. task:kworker/1:41 state:R running task stack:0 pid:15590 tgid:15590 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63234>] (__schedule) from [<81a645fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:863c3000 r8:80200c04 r7:ebb85d54 r6:ffffffff r5:863c3000 r4:00000000 [<81a645bc>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xebb85d20 to 0xebb85d68) 5d20: d723e000 ea7df000 00000001 80239bf8 7f246000 00000001 82acb1c4 82aca5a0 5d40: 7f246000 ea7df000 8280c9b4 ebb85d9c ebb85da0 ebb85d70 80230af0 80239c10 5d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804e9c00>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e997c>] (__purge_vmap_area_lazy) from [<804e9fb8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ebb85dc0 r5:ebb85e08 r4:ebb85dc0 [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8593dbc0 r4:00000000 [<804edab0>] (vfree) from [<80558908>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:863c3000 r7:00000000 r6:83018600 r5:00001000 r4:7f24a000 [<805588d8>] (execmem_free) from [<803c5e38>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfbb1000 [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c61b0>] (bpf_jit_free) from [<803c72c0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:8559178c r4:84904800 [<803c7180>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:8559178c r4:84904800 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:863c3000 r8:8490482c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:84904800 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84904800 r8:80278fec r7:ebb51e60 r6:84904080 r5:863c3000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb85fb0 to 0xebb85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:858c4c40 INFO: task kworker/1:51:15674 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:51 state:D stack:0 pid:15674 tgid:15674 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63234>] (__schedule) from [<81a641c8>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a63234>] (__schedule) from [<81a641c8>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:dff5dd84 r9:00000002 r8:60010013 r7:829171a0 r6:dff5dd8c r5:84b13c00 r4:84b13c00 [<81a6419c>] (schedule) from [<81a645b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:84b13c00 r4:8291719c [<81a64598>] (schedule_preempt_disabled) from [<81a67160>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64598>] (schedule_preempt_disabled) from [<81a67160>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a66e10>] (__mutex_lock.constprop.0) from [<81a67908>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff5de08 r4:00000000 [<81a678f4>] (__mutex_lock_slowpath) from [<81a67948>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a6790c>] (mutex_lock) from [<804e9e3c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f0a40 r4:00000000 [<804edab0>] (vfree) from [<80558908>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84b13c00 r7:00000000 r6:83018600 r5:00001000 r4:7f28e000 [<805588d8>] (execmem_free) from [<803c5e38>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:e0083000 [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c61b0>] (bpf_jit_free) from [<803c72c0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85593f8c r4:85420e00 [<803c7180>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:85593f8c r4:85420e00 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84b13c00 r8:85420e2c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85420e00 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85420e00 r8:80278fec r7:eb8cde60 r6:85420c00 r5:84b13c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff5dfb0 to 0xdff5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:84b95440 INFO: task kworker/1:51:15674 is blocked on a mutex likely owned by task kworker/1:41:15590. task:kworker/1:41 state:R running task stack:0 pid:15590 tgid:15590 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63234>] (__schedule) from [<81a645fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:863c3000 r8:80200c04 r7:ebb85d54 r6:ffffffff r5:863c3000 r4:00000000 [<81a645bc>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xebb85d20 to 0xebb85d68) 5d20: d723e000 ea7df000 00000001 80239bf8 7f246000 00000001 82acb1c4 82aca5a0 5d40: 7f246000 ea7df000 8280c9b4 ebb85d9c ebb85da0 ebb85d70 80230af0 80239c10 5d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804e9c00>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e997c>] (__purge_vmap_area_lazy) from [<804e9fb8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ebb85dc0 r5:ebb85e08 r4:ebb85dc0 [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8593dbc0 r4:00000000 [<804edab0>] (vfree) from [<80558908>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:863c3000 r7:00000000 r6:83018600 r5:00001000 r4:7f24a000 [<805588d8>] (execmem_free) from [<803c5e38>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfbb1000 [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c61b0>] (bpf_jit_free) from [<803c72c0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:8559178c r4:84904800 [<803c7180>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:8559178c r4:84904800 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:863c3000 r8:8490482c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:84904800 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84904800 r8:80278fec r7:ebb51e60 r6:84904080 r5:863c3000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb85fb0 to 0xebb85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:858c4c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:52:15677 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:52 state:D stack:0 pid:15677 tgid:15677 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63234>] (__schedule) from [<81a641c8>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a63234>] (__schedule) from [<81a641c8>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:dfbe1d84 r9:00000002 r8:60000113 r7:829171a0 r6:dfbe1d8c r5:83a66c00 r4:83a66c00 [<81a6419c>] (schedule) from [<81a645b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:83a66c00 r4:8291719c [<81a64598>] (schedule_preempt_disabled) from [<81a67160>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64598>] (schedule_preempt_disabled) from [<81a67160>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a66e10>] (__mutex_lock.constprop.0) from [<81a67908>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbe1e08 r4:00000000 [<81a678f4>] (__mutex_lock_slowpath) from [<81a67948>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a6790c>] (mutex_lock) from [<804e9e3c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85977400 r4:00000000 [<804edab0>] (vfree) from [<80558908>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:83a66c00 r7:00000000 r6:83018600 r5:00001000 r4:7f286000 [<805588d8>] (execmem_free) from [<803c5e38>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfc07000 [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c61b0>] (bpf_jit_free) from [<803c72c0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:8559238c r4:857cb900 [<803c7180>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:8559238c r4:857cb900 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:83a66c00 r8:857cb92c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:857cb900 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:857cb900 r8:80278fec r7:eb8cde60 r6:857cb880 r5:83a66c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbe1fb0 to 0xdfbe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85a51dc0 INFO: task kworker/1:52:15677 is blocked on a mutex likely owned by task kworker/1:41:15590. task:kworker/1:41 state:R running task stack:0 pid:15590 tgid:15590 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63234>] (__schedule) from [<81a645fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:863c3000 r8:80200c04 r7:ebb85d54 r6:ffffffff r5:863c3000 r4:00000000 [<81a645bc>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xebb85d20 to 0xebb85d68) 5d20: d78c5000 ea7df000 00000001 80239bf8 7f246000 00000001 82acb1c4 82aca5a0 5d40: 7f246000 ea7df000 8280c9b4 ebb85d9c ebb85da0 ebb85d70 80230af0 80239c10 5d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804e9c00>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e997c>] (__purge_vmap_area_lazy) from [<804e9fb8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ebb85dc0 r5:ebb85e08 r4:ebb85dc0 [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8593dbc0 r4:00000000 [<804edab0>] (vfree) from [<80558908>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:863c3000 r7:00000000 r6:83018600 r5:00001000 r4:7f24a000 [<805588d8>] (execmem_free) from [<803c5e38>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfbb1000 [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c61b0>] (bpf_jit_free) from [<803c72c0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:8559178c r4:84904800 [<803c7180>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:8559178c r4:84904800 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:863c3000 r8:8490482c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:84904800 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84904800 r8:80278fec r7:ebb51e60 r6:84904080 r5:863c3000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb85fb0 to 0xebb85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:858c4c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:53:15692 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:53 state:D stack:0 pid:15692 tgid:15692 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63234>] (__schedule) from [<81a641c8>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a63234>] (__schedule) from [<81a641c8>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:dfc19d84 r9:00000002 r8:60000013 r7:829171a0 r6:dfc19d8c r5:84b16c00 r4:84b16c00 [<81a6419c>] (schedule) from [<81a645b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:84b16c00 r4:8291719c [<81a64598>] (schedule_preempt_disabled) from [<81a67160>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64598>] (schedule_preempt_disabled) from [<81a67160>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a66e10>] (__mutex_lock.constprop.0) from [<81a67908>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc19e08 r4:00000000 [<81a678f4>] (__mutex_lock_slowpath) from [<81a67948>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a6790c>] (mutex_lock) from [<804e9e3c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491a8c0 r4:00000000 [<804edab0>] (vfree) from [<80558908>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84b16c00 r7:00000000 r6:83018600 r5:00001000 r4:7f292000 [<805588d8>] (execmem_free) from [<803c5e38>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:e41e1000 [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c61b0>] (bpf_jit_free) from [<803c72c0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:86013f8c r4:8493d180 [<803c7180>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:86013f8c r4:8493d180 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84b16c00 r8:8493d1ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:8493d180 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8493d180 r8:80278fec r7:eb8cde60 r6:85a43480 r5:84b16c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc19fb0 to 0xdfc19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:849c5980 INFO: task kworker/1:53:15692 is blocked on a mutex likely owned by task kworker/1:41:15590. task:kworker/1:41 state:R running task stack:0 pid:15590 tgid:15590 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63234>] (__schedule) from [<81a645fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:863c3000 r8:80200c04 r7:ebb85d54 r6:ffffffff r5:863c3000 r4:00000000 [<81a645bc>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xebb85d20 to 0xebb85d68) 5d20: d78c5000 ea7df000 00000001 80239bf8 7f246000 00000001 82acb1c4 82aca5a0 5d40: 7f246000 ea7df000 8280c9b4 ebb85d9c ebb85da0 ebb85d70 80230af0 80239c10 5d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804e9c00>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e997c>] (__purge_vmap_area_lazy) from [<804e9fb8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ebb85dc0 r5:ebb85e08 r4:ebb85dc0 [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8593dbc0 r4:00000000 [<804edab0>] (vfree) from [<80558908>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:863c3000 r7:00000000 r6:83018600 r5:00001000 r4:7f24a000 [<805588d8>] (execmem_free) from [<803c5e38>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfbb1000 [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c61b0>] (bpf_jit_free) from [<803c72c0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:8559178c r4:84904800 [<803c7180>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:8559178c r4:84904800 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:863c3000 r8:8490482c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:84904800 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84904800 r8:80278fec r7:ebb51e60 r6:84904080 r5:863c3000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb85fb0 to 0xebb85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:858c4c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:54:15706 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:54 state:D stack:0 pid:15706 tgid:15706 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63234>] (__schedule) from [<81a641c8>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a63234>] (__schedule) from [<81a641c8>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:e8275d84 r9:00000002 r8:60000113 r7:829171a0 r6:e8275d8c r5:8418a400 r4:8418a400 [<81a6419c>] (schedule) from [<81a645b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:8418a400 r4:8291719c [<81a64598>] (schedule_preempt_disabled) from [<81a67160>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64598>] (schedule_preempt_disabled) from [<81a67160>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a66e10>] (__mutex_lock.constprop.0) from [<81a67908>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8275e08 r4:00000000 [<81a678f4>] (__mutex_lock_slowpath) from [<81a67948>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a6790c>] (mutex_lock) from [<804e9e3c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fca580 r4:00000000 [<804edab0>] (vfree) from [<80558908>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:8418a400 r7:00000000 r6:83018600 r5:00001000 r4:7f290000 [<805588d8>] (execmem_free) from [<803c5e38>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:e009d000 [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c61b0>] (bpf_jit_free) from [<803c72c0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85ccc78c r4:854e8f80 [<803c7180>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:85ccc78c r4:854e8f80 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:8418a400 r8:854e8fac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:854e8f80 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:854e8f80 r8:80278fec r7:eb8cde60 r6:854e8d00 r5:8418a400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8275fb0 to 0xe8275ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85f2e500 INFO: task kworker/1:54:15706 is blocked on a mutex likely owned by task kworker/1:41:15590. task:kworker/1:41 state:R running task stack:0 pid:15590 tgid:15590 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63234>] (__schedule) from [<81a645fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:863c3000 r8:80200c04 r7:ebb85d54 r6:ffffffff r5:863c3000 r4:00000000 [<81a645bc>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xebb85d20 to 0xebb85d68) 5d20: d7a5c000 ea7df000 00000001 80239bf8 7f246000 00000001 82acb1c4 82aca5a0 5d40: 7f246000 ea7df000 8280c9b4 ebb85d9c ebb85da0 ebb85d70 80230af0 80239c10 5d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804e9c00>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e997c>] (__purge_vmap_area_lazy) from [<804e9fb8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ebb85dc0 r5:ebb85e08 r4:ebb85dc0 [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8593dbc0 r4:00000000 [<804edab0>] (vfree) from [<80558908>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:863c3000 r7:00000000 r6:83018600 r5:00001000 r4:7f24a000 [<805588d8>] (execmem_free) from [<803c5e38>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfbb1000 [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c61b0>] (bpf_jit_free) from [<803c72c0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:8559178c r4:84904800 [<803c7180>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:8559178c r4:84904800 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:863c3000 r8:8490482c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:84904800 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84904800 r8:80278fec r7:ebb51e60 r6:84904080 r5:863c3000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb85fb0 to 0xebb85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:858c4c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:55:15708 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:55 state:D stack:0 pid:15708 tgid:15708 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63234>] (__schedule) from [<81a641c8>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a63234>] (__schedule) from [<81a641c8>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:dfa31d84 r9:00000002 r8:60000013 r7:829171a0 r6:dfa31d8c r5:8418bc00 r4:8418bc00 [<81a6419c>] (schedule) from [<81a645b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:8418bc00 r4:8291719c [<81a64598>] (schedule_preempt_disabled) from [<81a67160>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64598>] (schedule_preempt_disabled) from [<81a67160>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a66e10>] (__mutex_lock.constprop.0) from [<81a67908>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa31e08 r4:00000000 [<81a678f4>] (__mutex_lock_slowpath) from [<81a67948>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a6790c>] (mutex_lock) from [<804e9e3c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85948240 r4:00000000 [<804edab0>] (vfree) from [<80558908>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:8418bc00 r7:00000000 r6:83018600 r5:00001000 r4:7f294000 [<805588d8>] (execmem_free) from [<803c5e38>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea31d000 [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c61b0>] (bpf_jit_free) from [<803c72c0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84dbaf8c r4:854e8e80 [<803c7180>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84dbaf8c r4:854e8e80 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:8418bc00 r8:854e8eac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:854e8e80 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:854e8e80 r8:80278fec r7:eb8cde60 r6:854e8c00 r5:8418bc00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa31fb0 to 0xdfa31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:848ddf40 INFO: task kworker/1:55:15708 is blocked on a mutex likely owned by task kworker/1:41:15590. task:kworker/1:41 state:R running task stack:0 pid:15590 tgid:15590 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63234>] (__schedule) from [<81a645fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:863c3000 r8:80200c04 r7:ebb85d54 r6:ffffffff r5:863c3000 r4:00000000 [<81a645bc>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xebb85d20 to 0xebb85d68) 5d20: d7a5c000 ea7df000 00000001 80239bf8 7f246000 00000001 82acb1c4 82aca5a0 5d40: 7f246000 ea7df000 8280c9b4 ebb85d9c ebb85da0 ebb85d70 80230af0 80239c10 5d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804e9c00>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e997c>] (__purge_vmap_area_lazy) from [<804e9fb8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ebb85dc0 r5:ebb85e08 r4:ebb85dc0 [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8593dbc0 r4:00000000 [<804edab0>] (vfree) from [<80558908>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:863c3000 r7:00000000 r6:83018600 r5:00001000 r4:7f24a000 [<805588d8>] (execmem_free) from [<803c5e38>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfbb1000 [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c61b0>] (bpf_jit_free) from [<803c72c0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:8559178c r4:84904800 [<803c7180>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:8559178c r4:84904800 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:863c3000 r8:8490482c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:84904800 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84904800 r8:80278fec r7:ebb51e60 r6:84904080 r5:863c3000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb85fb0 to 0xebb85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:858c4c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:56:15713 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:56 state:D stack:0 pid:15713 tgid:15713 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63234>] (__schedule) from [<81a641c8>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a63234>] (__schedule) from [<81a641c8>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ea32dd84 r9:00000002 r8:60000113 r7:829171a0 r6:ea32dd8c r5:863c0c00 r4:863c0c00 [<81a6419c>] (schedule) from [<81a645b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:863c0c00 r4:8291719c [<81a64598>] (schedule_preempt_disabled) from [<81a67160>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64598>] (schedule_preempt_disabled) from [<81a67160>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a66e10>] (__mutex_lock.constprop.0) from [<81a67908>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea32de08 r4:00000000 [<81a678f4>] (__mutex_lock_slowpath) from [<81a67948>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a6790c>] (mutex_lock) from [<804e9e3c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85771200 r4:00000000 [<804edab0>] (vfree) from [<80558908>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:863c0c00 r7:00000000 r6:83018600 r5:00001000 r4:7f298000 [<805588d8>] (execmem_free) from [<803c5e38>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea387000 [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c61b0>] (bpf_jit_free) from [<803c72c0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84dbb78c r4:856bc800 [<803c7180>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84dbb78c r4:856bc800 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:863c0c00 r8:856bc82c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856bc800 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856bc800 r8:80278fec r7:eb8cde60 r6:856bc580 r5:863c0c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea32dfb0 to 0xea32dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:848e9580 INFO: task kworker/1:56:15713 is blocked on a mutex likely owned by task kworker/1:41:15590. task:kworker/1:41 state:R running task stack:0 pid:15590 tgid:15590 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63234>] (__schedule) from [<81a645fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:863c3000 r8:80200c04 r7:ebb85d54 r6:ffffffff r5:863c3000 r4:00000000 [<81a645bc>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xebb85d20 to 0xebb85d68) 5d20: d7c07000 ea7df000 00000001 80239bf8 7f246000 00000001 82acb1c4 82aca5a0 5d40: 7f246000 ea7df000 8280c9b4 ebb85d9c ebb85da0 ebb85d70 80230af0 80239c10 5d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804e9c00>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e997c>] (__purge_vmap_area_lazy) from [<804e9fb8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ebb85dc0 r5:ebb85e08 r4:ebb85dc0 [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8593dbc0 r4:00000000 [<804edab0>] (vfree) from [<80558908>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:863c3000 r7:00000000 r6:83018600 r5:00001000 r4:7f24a000 [<805588d8>] (execmem_free) from [<803c5e38>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfbb1000 [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c61b0>] (bpf_jit_free) from [<803c72c0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:8559178c r4:84904800 [<803c7180>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:8559178c r4:84904800 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:863c3000 r8:8490482c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:84904800 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84904800 r8:80278fec r7:ebb51e60 r6:84904080 r5:863c3000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb85fb0 to 0xebb85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:858c4c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:57:15719 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:57 state:D stack:0 pid:15719 tgid:15719 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63234>] (__schedule) from [<81a641c8>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a63234>] (__schedule) from [<81a641c8>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ea2c1d84 r9:00000002 r8:60000113 r7:829171a0 r6:ea2c1d8c r5:8418c800 r4:8418c800 [<81a6419c>] (schedule) from [<81a645b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:8418c800 r4:8291719c [<81a64598>] (schedule_preempt_disabled) from [<81a67160>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64598>] (schedule_preempt_disabled) from [<81a67160>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a66e10>] (__mutex_lock.constprop.0) from [<81a67908>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea2c1e08 r4:00000000 [<81a678f4>] (__mutex_lock_slowpath) from [<81a67948>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a6790c>] (mutex_lock) from [<804e9e3c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85771780 r4:00000000 [<804edab0>] (vfree) from [<80558908>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:8418c800 r7:00000000 r6:83018600 r5:00001000 r4:7f296000 [<805588d8>] (execmem_free) from [<803c5e38>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea359000 [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c61b0>] (bpf_jit_free) from [<803c72c0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84dbb38c r4:856bcd00 [<803c7180>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84dbb38c r4:856bcd00 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:8418c800 r8:856bcd2c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856bcd00 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856bcd00 r8:80278fec r7:eb8cde60 r6:856bc880 r5:8418c800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea2c1fb0 to 0xea2c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85974480 INFO: task kworker/1:57:15719 is blocked on a mutex likely owned by task kworker/1:41:15590. task:kworker/1:41 state:R running task stack:0 pid:15590 tgid:15590 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63234>] (__schedule) from [<81a645fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:863c3000 r8:80200c04 r7:ebb85d54 r6:ffffffff r5:863c3000 r4:00000000 [<81a645bc>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xebb85d20 to 0xebb85d68) 5d20: d7ec3000 ea7df000 00000001 80239bf8 7f246000 00000001 82acb1c4 82aca5a0 5d40: 7f246000 ea7df000 8280c9b4 ebb85d9c ebb85da0 ebb85d70 80230af0 80239c10 5d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804e9c00>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e997c>] (__purge_vmap_area_lazy) from [<804e9fb8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ebb85dc0 r5:ebb85e08 r4:ebb85dc0 [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8593dbc0 r4:00000000 [<804edab0>] (vfree) from [<80558908>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:863c3000 r7:00000000 r6:83018600 r5:00001000 r4:7f24a000 [<805588d8>] (execmem_free) from [<803c5e38>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfbb1000 [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c61b0>] (bpf_jit_free) from [<803c72c0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:8559178c r4:84904800 [<803c7180>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:8559178c r4:84904800 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:863c3000 r8:8490482c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:84904800 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84904800 r8:80278fec r7:ebb51e60 r6:84904080 r5:863c3000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb85fb0 to 0xebb85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:858c4c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:58:15722 blocked for more than 431 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:58 state:D stack:0 pid:15722 tgid:15722 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63234>] (__schedule) from [<81a641c8>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a63234>] (__schedule) from [<81a641c8>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ea365d84 r9:00000002 r8:60010113 r7:829171a0 r6:ea365d8c r5:84b12400 r4:84b12400 [<81a6419c>] (schedule) from [<81a645b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:84b12400 r4:8291719c [<81a64598>] (schedule_preempt_disabled) from [<81a67160>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64598>] (schedule_preempt_disabled) from [<81a67160>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a66e10>] (__mutex_lock.constprop.0) from [<81a67908>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea365e08 r4:00000000 [<81a678f4>] (__mutex_lock_slowpath) from [<81a67948>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a6790c>] (mutex_lock) from [<804e9e3c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84999e40 r4:00000000 [<804edab0>] (vfree) from [<80558908>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84b12400 r7:00000000 r6:83018600 r5:00001000 r4:7f2a2000 [<805588d8>] (execmem_free) from [<803c5e38>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea525000 [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c61b0>] (bpf_jit_free) from [<803c72c0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84dba78c r4:856bcb00 [<803c7180>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84dba78c r4:856bcb00 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84b12400 r8:856bcb2c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856bcb00 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856bcb00 r8:80278fec r7:eb8cde60 r6:856bca80 r5:84b12400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea365fb0 to 0xea365ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:84d17bc0 INFO: task kworker/1:58:15722 is blocked on a mutex likely owned by task kworker/1:41:15590. task:kworker/1:41 state:R running task stack:0 pid:15590 tgid:15590 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63234>] (__schedule) from [<81a645fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:863c3000 r8:80200c04 r7:ebb85d54 r6:ffffffff r5:863c3000 r4:00000000 [<81a645bc>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xebb85d20 to 0xebb85d68) 5d20: d80e3000 ea7df000 00000001 80239bf8 7f246000 00000001 82acb1c4 82aca5a0 5d40: 7f246000 ea7df000 8280c9b4 ebb85d9c ebb85da0 ebb85d70 80230af0 80239c10 5d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804e9c00>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e997c>] (__purge_vmap_area_lazy) from [<804e9fb8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ebb85dc0 r5:ebb85e08 r4:ebb85dc0 [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8593dbc0 r4:00000000 [<804edab0>] (vfree) from [<80558908>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:863c3000 r7:00000000 r6:83018600 r5:00001000 r4:7f24a000 [<805588d8>] (execmem_free) from [<803c5e38>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfbb1000 [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c61b0>] (bpf_jit_free) from [<803c72c0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:8559178c r4:84904800 [<803c7180>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:8559178c r4:84904800 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:863c3000 r8:8490482c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:84904800 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84904800 r8:80278fec r7:ebb51e60 r6:84904080 r5:863c3000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb85fb0 to 0xebb85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:858c4c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:59:15723 blocked for more than 431 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:59 state:D stack:0 pid:15723 tgid:15723 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63234>] (__schedule) from [<81a641c8>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a63234>] (__schedule) from [<81a641c8>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ea3cdd84 r9:00000002 r8:60000113 r7:829171a0 r6:ea3cdd8c r5:84b11800 r4:84b11800 [<81a6419c>] (schedule) from [<81a645b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:84b11800 r4:8291719c [<81a64598>] (schedule_preempt_disabled) from [<81a67160>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64598>] (schedule_preempt_disabled) from [<81a67160>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a66e10>] (__mutex_lock.constprop.0) from [<81a67908>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea3cde08 r4:00000000 [<81a678f4>] (__mutex_lock_slowpath) from [<81a67948>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a6790c>] (mutex_lock) from [<804e9e3c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85929a00 r4:00000000 [<804edab0>] (vfree) from [<80558908>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84b11800 r7:00000000 r6:83018600 r5:00001000 r4:7f29c000 [<805588d8>] (execmem_free) from [<803c5e38>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea3c5000 [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c61b0>] (bpf_jit_free) from [<803c72c0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84dbbb8c r4:856bce80 [<803c7180>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84dbbb8c r4:856bce80 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84b11800 r8:856bceac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856bce80 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856bce80 r8:80278fec r7:ea365e60 r6:856bcb80 r5:84b11800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea3cdfb0 to 0xea3cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:84d17000 INFO: task kworker/1:59:15723 is blocked on a mutex likely owned by task kworker/1:41:15590. task:kworker/1:41 state:R running task stack:0 pid:15590 tgid:15590 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63234>] (__schedule) from [<81a645fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:863c3000 r8:80200c04 r7:ebb85d54 r6:ffffffff r5:863c3000 r4:00000000 [<81a645bc>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xebb85d20 to 0xebb85d68) 5d20: d8198000 ea7df000 00000001 80239bf8 7f246000 00000001 82acb1c4 82aca5a0 5d40: 7f246000 ea7df000 8280c9b4 ebb85d9c ebb85da0 ebb85d70 80230af0 80239c10 5d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804e9c00>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e997c>] (__purge_vmap_area_lazy) from [<804e9fb8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ebb85dc0 r5:ebb85e08 r4:ebb85dc0 [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8593dbc0 r4:00000000 [<804edab0>] (vfree) from [<80558908>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:863c3000 r7:00000000 r6:83018600 r5:00001000 r4:7f24a000 [<805588d8>] (execmem_free) from [<803c5e38>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfbb1000 [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c61b0>] (bpf_jit_free) from [<803c72c0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:8559178c r4:84904800 [<803c7180>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:8559178c r4:84904800 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:863c3000 r8:8490482c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:84904800 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84904800 r8:80278fec r7:ebb51e60 r6:84904080 r5:863c3000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb85fb0 to 0xebb85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:858c4c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:60:15728 blocked for more than 431 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:60 state:D stack:0 pid:15728 tgid:15728 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63234>] (__schedule) from [<81a641c8>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a63234>] (__schedule) from [<81a641c8>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ea369d84 r9:00000002 r8:60000113 r7:829171a0 r6:ea369d8c r5:863c6c00 r4:863c6c00 [<81a6419c>] (schedule) from [<81a645b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:863c6c00 r4:8291719c [<81a64598>] (schedule_preempt_disabled) from [<81a67160>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64598>] (schedule_preempt_disabled) from [<81a67160>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a66e10>] (__mutex_lock.constprop.0) from [<81a67908>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea369e08 r4:00000000 [<81a678f4>] (__mutex_lock_slowpath) from [<81a67948>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a6790c>] (mutex_lock) from [<804e9e3c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84934780 r4:00000000 [<804edab0>] (vfree) from [<80558908>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:863c6c00 r7:00000000 r6:83018600 r5:00001000 r4:7f29e000 [<805588d8>] (execmem_free) from [<803c5e38>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea3f1000 [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c61b0>] (bpf_jit_free) from [<803c72c0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85ccc38c r4:856bca00 [<803c7180>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:85ccc38c r4:856bca00 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:863c6c00 r8:856bca2c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856bca00 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856bca00 r8:80278fec r7:ea365e60 r6:8591ec80 r5:863c6c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea369fb0 to 0xea369ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:84c3e700 INFO: task kworker/1:60:15728 is blocked on a mutex likely owned by task kworker/1:41:15590. task:kworker/1:41 state:R running task stack:0 pid:15590 tgid:15590 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63234>] (__schedule) from [<81a645fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:863c3000 r8:80200c04 r7:ebb85d54 r6:ffffffff r5:863c3000 r4:00000000 [<81a645bc>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xebb85d20 to 0xebb85d68) 5d20: d8198000 ea7df000 00000001 80239bf8 7f246000 00000001 82acb1c4 82aca5a0 5d40: 7f246000 ea7df000 8280c9b4 ebb85d9c ebb85da0 ebb85d70 80230af0 80239c10 5d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804e9c00>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e997c>] (__purge_vmap_area_lazy) from [<804e9fb8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ebb85dc0 r5:ebb85e08 r4:ebb85dc0 [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8593dbc0 r4:00000000 [<804edab0>] (vfree) from [<80558908>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:863c3000 r7:00000000 r6:83018600 r5:00001000 r4:7f24a000 [<805588d8>] (execmem_free) from [<803c5e38>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfbb1000 [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c61b0>] (bpf_jit_free) from [<803c72c0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:8559178c r4:84904800 [<803c7180>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:8559178c r4:84904800 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:863c3000 r8:8490482c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:84904800 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84904800 r8:80278fec r7:ebb51e60 r6:84904080 r5:863c3000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb85fb0 to 0xebb85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:858c4c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:61:15731 blocked for more than 431 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:61 state:D stack:0 pid:15731 tgid:15731 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63234>] (__schedule) from [<81a641c8>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a63234>] (__schedule) from [<81a641c8>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ea4b1d84 r9:00000002 r8:60000013 r7:829171a0 r6:ea4b1d8c r5:84d79800 r4:84d79800 [<81a6419c>] (schedule) from [<81a645b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:84d79800 r4:8291719c [<81a64598>] (schedule_preempt_disabled) from [<81a67160>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64598>] (schedule_preempt_disabled) from [<81a67160>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a66e10>] (__mutex_lock.constprop.0) from [<81a67908>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea4b1e08 r4:00000000 [<81a678f4>] (__mutex_lock_slowpath) from [<81a67948>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a6790c>] (mutex_lock) from [<804e9e3c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85440980 r4:00000000 [<804edab0>] (vfree) from [<80558908>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84d79800 r7:00000000 r6:83018600 r5:00001000 r4:7f2a4000 [<805588d8>] (execmem_free) from [<803c5e38>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ebc25000 [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c61b0>] (bpf_jit_free) from [<803c72c0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:8601378c r4:8591ec00 [<803c7180>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:8601378c r4:8591ec00 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84d79800 r8:8591ec2c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:8591ec00 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8591ec00 r8:80278fec r7:ea365e60 r6:8591e900 r5:84d79800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea4b1fb0 to 0xea4b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85929ec0 INFO: task kworker/1:61:15731 is blocked on a mutex likely owned by task kworker/1:41:15590. task:kworker/1:41 state:R running task stack:0 pid:15590 tgid:15590 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63234>] (__schedule) from [<81a645fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:863c3000 r8:80200c04 r7:ebb85d54 r6:ffffffff r5:863c3000 r4:00000000 [<81a645bc>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xebb85d20 to 0xebb85d68) 5d20: d86ac000 ea7df000 00000001 80239bf8 7f246000 00000001 82acb1c4 82aca5a0 5d40: 7f246000 ea7df000 8280c9b4 ebb85d9c ebb85da0 ebb85d70 80230af0 80239c10 5d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804e9c00>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e997c>] (__purge_vmap_area_lazy) from [<804e9fb8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ebb85dc0 r5:ebb85e08 r4:ebb85dc0 [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8593dbc0 r4:00000000 [<804edab0>] (vfree) from [<80558908>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:863c3000 r7:00000000 r6:83018600 r5:00001000 r4:7f24a000 [<805588d8>] (execmem_free) from [<803c5e38>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfbb1000 [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c61b0>] (bpf_jit_free) from [<803c72c0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:8559178c r4:84904800 [<803c7180>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:8559178c r4:84904800 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:863c3000 r8:8490482c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:84904800 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84904800 r8:80278fec r7:ebb51e60 r6:84904080 r5:863c3000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb85fb0 to 0xebb85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:858c4c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:62:15736 blocked for more than 431 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:62 state:D stack:0 pid:15736 tgid:15736 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63234>] (__schedule) from [<81a641c8>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a63234>] (__schedule) from [<81a641c8>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ea3d9d84 r9:00000002 r8:60000013 r7:829171a0 r6:ea3d9d8c r5:863c4800 r4:863c4800 [<81a6419c>] (schedule) from [<81a645b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:863c4800 r4:8291719c [<81a64598>] (schedule_preempt_disabled) from [<81a67160>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64598>] (schedule_preempt_disabled) from [<81a67160>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a66e10>] (__mutex_lock.constprop.0) from [<81a67908>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea3d9e08 r4:00000000 [<81a678f4>] (__mutex_lock_slowpath) from [<81a67948>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a6790c>] (mutex_lock) from [<804e9e3c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849be100 r4:00000000 [<804edab0>] (vfree) from [<80558908>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:863c4800 r7:00000000 r6:83018600 r5:00001000 r4:7f2a0000 [<805588d8>] (execmem_free) from [<803c5e38>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea509000 [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c61b0>] (bpf_jit_free) from [<803c72c0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84db938c r4:8591e880 [<803c7180>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84db938c r4:8591e880 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:863c4800 r8:8591e8ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:8591e880 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8591e880 r8:80278fec r7:ea4b1e60 r6:8591e800 r5:863c4800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea3d9fb0 to 0xea3d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:859a6640 INFO: task kworker/1:62:15736 is blocked on a mutex likely owned by task kworker/1:41:15590. task:kworker/1:41 state:R running task stack:0 pid:15590 tgid:15590 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63234>] (__schedule) from [<81a645fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:863c3000 r8:80200c04 r7:ebb85d54 r6:ffffffff r5:863c3000 r4:00000000 [<81a645bc>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xebb85d20 to 0xebb85d68) 5d20: d8997000 ea7df000 00000001 80239bf8 7f246000 00000001 82acb1c4 82aca5a0 5d40: 7f246000 ea7df000 8280c9b4 ebb85d9c ebb85da0 ebb85d70 80230af0 80239c10 5d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804e9c00>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e997c>] (__purge_vmap_area_lazy) from [<804e9fb8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ebb85dc0 r5:ebb85e08 r4:ebb85dc0 [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8593dbc0 r4:00000000 [<804edab0>] (vfree) from [<80558908>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:863c3000 r7:00000000 r6:83018600 r5:00001000 r4:7f24a000 [<805588d8>] (execmem_free) from [<803c5e38>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfbb1000 [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c61b0>] (bpf_jit_free) from [<803c72c0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:8559178c r4:84904800 [<803c7180>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:8559178c r4:84904800 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:863c3000 r8:8490482c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:84904800 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84904800 r8:80278fec r7:ebb51e60 r6:84904080 r5:863c3000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb85fb0 to 0xebb85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:858c4c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:63:15749 blocked for more than 431 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:63 state:D stack:0 pid:15749 tgid:15749 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63234>] (__schedule) from [<81a641c8>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a63234>] (__schedule) from [<81a641c8>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ea561d84 r9:00000002 r8:60000013 r7:829171a0 r6:ea561d8c r5:84d7bc00 r4:84d7bc00 [<81a6419c>] (schedule) from [<81a645b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:84d7bc00 r4:8291719c [<81a64598>] (schedule_preempt_disabled) from [<81a67160>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64598>] (schedule_preempt_disabled) from [<81a67160>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a66e10>] (__mutex_lock.constprop.0) from [<81a67908>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea561e08 r4:00000000 [<81a678f4>] (__mutex_lock_slowpath) from [<81a67948>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a6790c>] (mutex_lock) from [<804e9e3c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85440a80 r4:00000000 [<804edab0>] (vfree) from [<80558908>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84d7bc00 r7:00000000 r6:83018600 r5:00001000 r4:7f2a6000 [<805588d8>] (execmem_free) from [<803c5e38>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ebc3e000 [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c61b0>] (bpf_jit_free) from [<803c72c0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:8601278c r4:8591e500 [<803c7180>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:8601278c r4:8591e500 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84d7bc00 r8:8591e52c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:8591e500 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8591e500 r8:80278fec r7:ea4b1e60 r6:8591e600 r5:84d7bc00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea561fb0 to 0xea561ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:84f66e40 INFO: task kworker/1:63:15749 is blocked on a mutex likely owned by task kworker/1:41:15590. task:kworker/1:41 state:R running task stack:0 pid:15590 tgid:15590 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63234>] (__schedule) from [<81a645fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:863c3000 r8:80200c04 r7:ebb85d54 r6:ffffffff r5:863c3000 r4:00000000 [<81a645bc>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xebb85d20 to 0xebb85d68) 5d20: d8ad8000 ea7df000 00000001 80239bf8 7f246000 00000001 82acb1c4 82aca5a0 5d40: 7f246000 ea7df000 8280c9b4 ebb85d9c ebb85da0 ebb85d70 80230af0 80239c10 5d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804e9c00>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e997c>] (__purge_vmap_area_lazy) from [<804e9fb8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ebb85dc0 r5:ebb85e08 r4:ebb85dc0 [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8593dbc0 r4:00000000 [<804edab0>] (vfree) from [<80558908>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:863c3000 r7:00000000 r6:83018600 r5:00001000 r4:7f24a000 [<805588d8>] (execmem_free) from [<803c5e38>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfbb1000 [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c61b0>] (bpf_jit_free) from [<803c72c0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:8559178c r4:84904800 [<803c7180>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:8559178c r4:84904800 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:863c3000 r8:8490482c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:84904800 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84904800 r8:80278fec r7:ebb51e60 r6:84904080 r5:863c3000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb85fb0 to 0xebb85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:858c4c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:65:15754 blocked for more than 431 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:65 state:D stack:0 pid:15754 tgid:15754 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63234>] (__schedule) from [<81a641c8>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a63234>] (__schedule) from [<81a641c8>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ea4b5d84 r9:00000002 r8:60000113 r7:829171a0 r6:ea4b5d8c r5:83870c00 r4:83870c00 [<81a6419c>] (schedule) from [<81a645b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:83870c00 r4:8291719c [<81a64598>] (schedule_preempt_disabled) from [<81a67160>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64598>] (schedule_preempt_disabled) from [<81a67160>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a66e10>] (__mutex_lock.constprop.0) from [<81a67908>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea4b5e08 r4:00000000 [<81a678f4>] (__mutex_lock_slowpath) from [<81a67948>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a6790c>] (mutex_lock) from [<804e9e3c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a41080 r4:00000000 [<804edab0>] (vfree) from [<80558908>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:83870c00 r7:00000000 r6:83018600 r5:00001000 r4:7f2a8000 [<805588d8>] (execmem_free) from [<803c5e38>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ebc65000 [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c61b0>] (bpf_jit_free) from [<803c72c0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:8601078c r4:859e0d00 [<803c7180>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:8601078c r4:859e0d00 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:83870c00 r8:859e0d2c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:859e0d00 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:859e0d00 r8:80278fec r7:ea539e60 r6:859aa280 r5:83870c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea4b5fb0 to 0xea4b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:858440c0 INFO: task kworker/1:65:15754 is blocked on a mutex likely owned by task kworker/1:41:15590. task:kworker/1:41 state:R running task stack:0 pid:15590 tgid:15590 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63234>] (__schedule) from [<81a645fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:863c3000 r8:80200c04 r7:ebb85d54 r6:ffffffff r5:863c3000 r4:00000000 [<81a645bc>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xebb85d20 to 0xebb85d68) 5d20: d8cb1000 ea7df000 00000001 80239bf8 7f246000 00000001 82acb1c4 82aca5a0 5d40: 7f246000 ea7df000 8280c9b4 ebb85d9c ebb85da0 ebb85d70 80230af0 80239c10 5d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804e9c00>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e997c>] (__purge_vmap_area_lazy) from [<804e9fb8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ebb85dc0 r5:ebb85e08 r4:ebb85dc0 [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8593dbc0 r4:00000000 [<804edab0>] (vfree) from [<80558908>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:863c3000 r7:00000000 r6:83018600 r5:00001000 r4:7f24a000 [<805588d8>] (execmem_free) from [<803c5e38>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfbb1000 [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c61b0>] (bpf_jit_free) from [<803c72c0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:8559178c r4:84904800 [<803c7180>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:8559178c r4:84904800 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:863c3000 r8:8490482c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:84904800 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84904800 r8:80278fec r7:ebb51e60 r6:84904080 r5:863c3000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb85fb0 to 0xebb85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:858c4c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:3:15760 blocked for more than 431 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:3 state:D stack:0 pid:15760 tgid:15760 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63234>] (__schedule) from [<81a641c8>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a63234>] (__schedule) from [<81a641c8>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ea4d9d84 r9:00000002 r8:60000013 r7:829171a0 r6:ea4d9d8c r5:83b7e000 r4:83b7e000 [<81a6419c>] (schedule) from [<81a645b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:83b7e000 r4:8291719c [<81a64598>] (schedule_preempt_disabled) from [<81a67160>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64598>] (schedule_preempt_disabled) from [<81a67160>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a66e10>] (__mutex_lock.constprop.0) from [<81a67908>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea4d9e08 r4:00000000 [<81a678f4>] (__mutex_lock_slowpath) from [<81a67948>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a6790c>] (mutex_lock) from [<804e9e3c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859e8ec0 r4:00000000 [<804edab0>] (vfree) from [<80558908>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:83b7e000 r7:00000000 r6:83018400 r5:00001000 r4:7f2ae000 [<805588d8>] (execmem_free) from [<803c5e38>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ebce2000 [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c61b0>] (bpf_jit_free) from [<803c72c0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85b7478c r4:85881800 [<803c7180>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:85b7478c r4:85881800 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:83b7e000 r8:8588182c r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:85881800 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85881800 r8:80278fec r7:df989e60 r6:85881b80 r5:83b7e000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea4d9fb0 to 0xea4d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:849ad600 INFO: task kworker/0:3:15760 is blocked on a mutex likely owned by task kworker/1:41:15590. task:kworker/1:41 state:R running task stack:0 pid:15590 tgid:15590 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63234>] (__schedule) from [<81a645fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:863c3000 r8:80200c04 r7:ebb85d54 r6:ffffffff r5:863c3000 r4:00000000 [<81a645bc>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xebb85d20 to 0xebb85d68) 5d20: d8d80000 ea7df000 00000001 80239bf8 7f246000 00000001 82acb1c4 82aca5a0 5d40: 7f246000 ea7df000 8280c9b4 ebb85d9c ebb85da0 ebb85d70 80230af0 80239c10 5d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804e9c00>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e997c>] (__purge_vmap_area_lazy) from [<804e9fb8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ebb85dc0 r5:ebb85e08 r4:ebb85dc0 [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8593dbc0 r4:00000000 [<804edab0>] (vfree) from [<80558908>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:863c3000 r7:00000000 r6:83018600 r5:00001000 r4:7f24a000 [<805588d8>] (execmem_free) from [<803c5e38>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfbb1000 [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c61b0>] (bpf_jit_free) from [<803c72c0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:8559178c r4:84904800 [<803c7180>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:8559178c r4:84904800 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:863c3000 r8:8490482c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:84904800 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84904800 r8:80278fec r7:ebb51e60 r6:84904080 r5:863c3000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb85fb0 to 0xebb85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:858c4c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:5:15766 blocked for more than 431 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:5 state:D stack:0 pid:15766 tgid:15766 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63234>] (__schedule) from [<81a641c8>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a63234>] (__schedule) from [<81a641c8>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ebcedd84 r9:00000002 r8:60000013 r7:829171a0 r6:ebcedd8c r5:8381ec00 r4:8381ec00 [<81a6419c>] (schedule) from [<81a645b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:8381ec00 r4:8291719c [<81a64598>] (schedule_preempt_disabled) from [<81a67160>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64598>] (schedule_preempt_disabled) from [<81a67160>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a66e10>] (__mutex_lock.constprop.0) from [<81a67908>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcede08 r4:00000000 [<81a678f4>] (__mutex_lock_slowpath) from [<81a67948>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a6790c>] (mutex_lock) from [<804e9e3c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85950440 r4:00000000 [<804edab0>] (vfree) from [<80558908>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:8381ec00 r7:00000000 r6:83018400 r5:00001000 r4:7f2b0000 [<805588d8>] (execmem_free) from [<803c5e38>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ebcef000 [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c61b0>] (bpf_jit_free) from [<803c72c0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85b75b8c r4:8591ef00 [<803c7180>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:85b75b8c r4:8591ef00 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:8381ec00 r8:8591ef2c r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:8591ef00 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8591ef00 r8:80278fec r7:ea2bde60 r6:8497f600 r5:8381ec00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebcedfb0 to 0xebcedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85776480 INFO: task kworker/0:5:15766 is blocked on a mutex likely owned by task kworker/1:41:15590. task:kworker/1:41 state:R running task stack:0 pid:15590 tgid:15590 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63234>] (__schedule) from [<81a645fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:863c3000 r8:80200c04 r7:ebb85d54 r6:ffffffff r5:863c3000 r4:00000000 [<81a645bc>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xebb85d20 to 0xebb85d68) 5d20: d8d80000 ea7df000 00000001 80239bf8 7f246000 00000001 82acb1c4 82aca5a0 5d40: 7f246000 ea7df000 8280c9b4 ebb85d9c ebb85da0 ebb85d70 80230af0 80239c10 5d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804e9c00>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e997c>] (__purge_vmap_area_lazy) from [<804e9fb8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ebb85dc0 r5:ebb85e08 r4:ebb85dc0 [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8593dbc0 r4:00000000 [<804edab0>] (vfree) from [<80558908>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:863c3000 r7:00000000 r6:83018600 r5:00001000 r4:7f24a000 [<805588d8>] (execmem_free) from [<803c5e38>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfbb1000 [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c61b0>] (bpf_jit_free) from [<803c72c0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:8559178c r4:84904800 [<803c7180>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:8559178c r4:84904800 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:863c3000 r8:8490482c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:84904800 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84904800 r8:80278fec r7:ebb51e60 r6:84904080 r5:863c3000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb85fb0 to 0xebb85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:858c4c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 30 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT Hardware name: ARM-Versatile Express Call trace: [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c arch/arm/kernel/traps.c:257) r7:00000000 r6:000e0113 r5:600e0193 r4:82252488 [<80201b08>] (show_stack) from [<8021f93c>] (__dump_stack lib/dump_stack.c:94 [inline]) [<80201b08>] (show_stack) from [<8021f93c>] (dump_stack_lvl+0x70/0x7c lib/dump_stack.c:120) [<8021f8cc>] (dump_stack_lvl) from [<8021f960>] (dump_stack+0x18/0x1c lib/dump_stack.c:129) r5:00000001 r4:00000001 [<8021f948>] (dump_stack) from [<81a4ce4c>] (nmi_cpu_backtrace+0x160/0x17c lib/nmi_backtrace.c:113) [<81a4ccec>] (nmi_cpu_backtrace) from [<81a4cf98>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8 lib/nmi_backtrace.c:62) r7:00000001 r6:8280c690 r5:8281ae34 r4:ffffffff [<81a4ce68>] (nmi_trigger_cpumask_backtrace) from [<802304fc>] (arch_trigger_cpumask_backtrace+0x18/0x1c arch/arm/kernel/smp.c:852) r9:8281ba28 r8:8280c810 r7:00031ef9 r6:00007cf5 r5:82abf7d4 r4:85d8d10c [<802304e4>] (arch_trigger_cpumask_backtrace) from [<8037f9a8>] (trigger_all_cpu_backtrace include/linux/nmi.h:160 [inline]) [<802304e4>] (arch_trigger_cpumask_backtrace) from [<8037f9a8>] (check_hung_uninterruptible_tasks kernel/hung_task.c:332 [inline]) [<802304e4>] (arch_trigger_cpumask_backtrace) from [<8037f9a8>] (watchdog+0x5d0/0x850 kernel/hung_task.c:495) [<8037f3d8>] (watchdog) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:00000000 r8:8037f3d8 r7:832a2a80 r6:832a2a80 r5:832e1800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf8d9fb0 to 0xdf8d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:833795c0 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 2819 Comm: pr/ttyAMA-1 Not tainted syzkaller #0 PREEMPT Hardware name: ARM-Versatile Express PC is at __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:152 [inline] PC is at _raw_spin_unlock_irqrestore+0x28/0x54 kernel/locking/spinlock.c:194 LR is at spin_unlock_irqrestore include/linux/spinlock.h:406 [inline] LR is at __uart_port_unlock_irqrestore include/linux/serial_core.h:616 [inline] LR is at pl011_console_device_unlock+0x20/0x24 drivers/tty/serial/amba-pl011.c:2603 pc : [<81a6d09c>] lr : [<80a8eea8>] psr: 600f0013 sp : eaec1eb0 ip : eaec1ec0 fp : eaec1ebc r10: 82959554 r9 : 00000000 r8 : 00000000 r7 : 00000117 r6 : 829594b8 r5 : 00000000 r4 : 00000001 r3 : 00001c04 r2 : 00000000 r1 : 600f0013 r0 : 83c62c40 Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user Control: 30c5387d Table: 8482d080 DAC: fffffffd Call trace: [<81a6d074>] (_raw_spin_unlock_irqrestore) from [<80a8eea8>] (spin_unlock_irqrestore include/linux/spinlock.h:406 [inline]) [<81a6d074>] (_raw_spin_unlock_irqrestore) from [<80a8eea8>] (__uart_port_unlock_irqrestore include/linux/serial_core.h:616 [inline]) [<81a6d074>] (_raw_spin_unlock_irqrestore) from [<80a8eea8>] (pl011_console_device_unlock+0x20/0x24 drivers/tty/serial/amba-pl011.c:2603) [<80a8ee88>] (pl011_console_device_unlock) from [<802e3660>] (nbcon_emit_one+0x88/0x100 kernel/printk/nbcon.c:1142) [<802e35d8>] (nbcon_emit_one) from [<802e3880>] (nbcon_kthread_func+0x1a8/0x2a4 kernel/printk/nbcon.c:1229) r6:8280c690 r5:84b13000 r4:829594b8 [<802e36d8>] (nbcon_kthread_func) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:829594b8 r8:802e36d8 r7:8474f100 r6:8474f100 r5:84b13000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec1fb0 to 0xeaec1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:84728f80