INFO: task kworker/0:8:6395 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:8 state:D stack:0 pid:6395 tgid:6395 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63614>] (__schedule) from [<81a645a8>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a63614>] (__schedule) from [<81a645a8>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:e00edd84 r9:00000002 r8:60000113 r7:829171a0 r6:e00edd8c r5:84726c00 r4:84726c00 [<81a6457c>] (schedule) from [<81a64990>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:84726c00 r4:8291719c [<81a64978>] (schedule_preempt_disabled) from [<81a67540>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64978>] (schedule_preempt_disabled) from [<81a67540>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a671f0>] (__mutex_lock.constprop.0) from [<81a67ce8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00ede08 r4:00000000 [<81a67cd4>] (__mutex_lock_slowpath) from [<81a67d28>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a67cec>] (mutex_lock) from [<804e9f5c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804e9ef4>] (_vm_unmap_aliases) from [<804edd3c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9ef4>] (_vm_unmap_aliases) from [<804edd3c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b48380 r4:00000000 [<804edbd0>] (vfree) from [<80558a28>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:84726c00 r7:00000000 r6:83018400 r5:00001000 r4:7f286000 [<805589f8>] (execmem_free) from [<803c5f48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:e422b000 [<803c5f38>] (bpf_jit_free_exec) from [<803c6328>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f38>] (bpf_jit_free_exec) from [<803c6328>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c62c0>] (bpf_jit_free) from [<803c73d0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:847dd38c r4:86468d00 [<803c7290>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:847dd38c r4:86468d00 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84726c00 r8:86468d2c r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:86468d00 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:86468d00 r8:80278fec r7:df845e60 r6:86468b00 r5:84726c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00edfb0 to 0xe00edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85810c80 INFO: task kworker/0:8:6395 is blocked on a mutex likely owned by task kworker/1:0:23. task:kworker/1:0 state:R running task stack:0 pid:23 tgid:23 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63614>] (__schedule) from [<81a649dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:8321a400 r8:80200c04 r7:df879d54 r6:ffffffff r5:8321a400 r4:00000000 [<81a6499c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdf879d20 to 0xdf879d68) 9d20: b07aa000 ea637000 00000001 80239bf8 7f26e000 00000001 82acb1c4 82aca5a0 9d40: 7f26e000 ea637000 8280c9b4 df879d9c df879da0 df879d70 80230af0 80239c10 9d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804e9d20>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9a9c>] (__purge_vmap_area_lazy) from [<804ea0d8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df879dc0 r5:df879e08 r4:df879dc0 [<804e9ef4>] (_vm_unmap_aliases) from [<804edd3c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9ef4>] (_vm_unmap_aliases) from [<804edd3c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85892180 r4:00000000 [<804edbd0>] (vfree) from [<80558a28>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:8321a400 r7:00000000 r6:83018600 r5:00001000 r4:7f280000 [<805589f8>] (execmem_free) from [<803c5f48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:e0143000 [<803c5f38>] (bpf_jit_free_exec) from [<803c6328>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f38>] (bpf_jit_free_exec) from [<803c6328>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c62c0>] (bpf_jit_free) from [<803c73d0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84705f8c r4:830cf000 [<803c7290>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84705f8c r4:830cf000 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:8321a400 r8:830cf02c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:830cf000 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:830cf000 r8:80278fec r7:df819d50 r6:830cf080 r5:8321a400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf879fb0 to 0xdf879ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:830cd200 INFO: task kworker/0:14:6490 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:14 state:D stack:0 pid:6490 tgid:6490 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63614>] (__schedule) from [<81a645a8>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a63614>] (__schedule) from [<81a645a8>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:dfa85d84 r9:00000002 r8:60000113 r7:829171a0 r6:dfa85d8c r5:83b2b000 r4:83b2b000 [<81a6457c>] (schedule) from [<81a64990>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:83b2b000 r4:8291719c [<81a64978>] (schedule_preempt_disabled) from [<81a67540>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64978>] (schedule_preempt_disabled) from [<81a67540>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a671f0>] (__mutex_lock.constprop.0) from [<81a67ce8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa85e08 r4:00000000 [<81a67cd4>] (__mutex_lock_slowpath) from [<81a67d28>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a67cec>] (mutex_lock) from [<804e9f5c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804e9ef4>] (_vm_unmap_aliases) from [<804edd3c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9ef4>] (_vm_unmap_aliases) from [<804edd3c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8471af40 r4:00000000 [<804edbd0>] (vfree) from [<80558a28>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:83b2b000 r7:00000000 r6:83018400 r5:00001000 r4:7f28c000 [<805589f8>] (execmem_free) from [<803c5f48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea303000 [<803c5f38>] (bpf_jit_free_exec) from [<803c6328>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f38>] (bpf_jit_free_exec) from [<803c6328>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c62c0>] (bpf_jit_free) from [<803c73d0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:847d138c r4:86468880 [<803c7290>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:847d138c r4:86468880 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:83b2b000 r8:864688ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:86468880 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:86468880 r8:80278fec r7:e0011e60 r6:8610db00 r5:83b2b000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa85fb0 to 0xdfa85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:858cf580 INFO: task kworker/0:14:6490 is blocked on a mutex likely owned by task kworker/1:0:23. task:kworker/1:0 state:R running task stack:0 pid:23 tgid:23 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63614>] (__schedule) from [<81a649dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:8321a400 r8:80200c04 r7:df879d54 r6:ffffffff r5:8321a400 r4:00000000 [<81a6499c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdf879d20 to 0xdf879d68) 9d20: b2fc4000 ea637000 00000001 80239bf8 7f26e000 00000001 82acb1c4 82aca5a0 9d40: 7f26e000 ea637000 8280c9b4 df879d9c df879da0 df879d70 80230af0 80239c10 9d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804e9d20>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9a9c>] (__purge_vmap_area_lazy) from [<804ea0d8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df879dc0 r5:df879e08 r4:df879dc0 [<804e9ef4>] (_vm_unmap_aliases) from [<804edd3c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9ef4>] (_vm_unmap_aliases) from [<804edd3c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85892180 r4:00000000 [<804edbd0>] (vfree) from [<80558a28>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:8321a400 r7:00000000 r6:83018600 r5:00001000 r4:7f280000 [<805589f8>] (execmem_free) from [<803c5f48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:e0143000 [<803c5f38>] (bpf_jit_free_exec) from [<803c6328>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f38>] (bpf_jit_free_exec) from [<803c6328>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c62c0>] (bpf_jit_free) from [<803c73d0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84705f8c r4:830cf000 [<803c7290>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84705f8c r4:830cf000 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:8321a400 r8:830cf02c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:830cf000 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:830cf000 r8:80278fec r7:df819d50 r6:830cf080 r5:8321a400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf879fb0 to 0xdf879ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:830cd200 INFO: task kworker/0:0:11196 blocked for more than 435 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:0 state:D stack:0 pid:11196 tgid:11196 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63614>] (__schedule) from [<81a645a8>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a63614>] (__schedule) from [<81a645a8>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:dfb35d84 r9:00000002 r8:60010113 r7:829171a0 r6:dfb35d8c r5:856a8c00 r4:856a8c00 [<81a6457c>] (schedule) from [<81a64990>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:856a8c00 r4:8291719c [<81a64978>] (schedule_preempt_disabled) from [<81a67540>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64978>] (schedule_preempt_disabled) from [<81a67540>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a671f0>] (__mutex_lock.constprop.0) from [<81a67ce8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb35e08 r4:00000000 [<81a67cd4>] (__mutex_lock_slowpath) from [<81a67d28>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a67cec>] (mutex_lock) from [<804e9f5c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804e9ef4>] (_vm_unmap_aliases) from [<804edd3c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9ef4>] (_vm_unmap_aliases) from [<804edd3c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8580e480 r4:00000000 [<804edbd0>] (vfree) from [<80558a28>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:856a8c00 r7:00000000 r6:83018400 r5:00001000 r4:7f284000 [<805589f8>] (execmem_free) from [<803c5f48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:e01b1000 [<803c5f38>] (bpf_jit_free_exec) from [<803c6328>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f38>] (bpf_jit_free_exec) from [<803c6328>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c62c0>] (bpf_jit_free) from [<803c73d0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84f02f8c r4:8614bf80 [<803c7290>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:84f02f8c r4:8614bf80 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:856a8c00 r8:8614bfac r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:8614bf80 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8614bf80 r8:80278fec r7:e00ede60 r6:856d9b00 r5:856a8c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb35fb0 to 0xdfb35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:84b4ff00 INFO: task kworker/0:0:11196 is blocked on a mutex likely owned by task kworker/1:0:23. task:kworker/1:0 state:R running task stack:0 pid:23 tgid:23 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63614>] (__schedule) from [<81a649dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:8321a400 r8:80200c04 r7:df879d54 r6:ffffffff r5:8321a400 r4:00000000 [<81a6499c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdf879d20 to 0xdf879d68) 9d20: b2fc4000 ea637000 00000001 80239bf8 7f26e000 00000001 82acb1c4 82aca5a0 9d40: 7f26e000 ea637000 8280c9b4 df879d9c df879da0 df879d70 80230af0 80239c10 9d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804e9d20>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9a9c>] (__purge_vmap_area_lazy) from [<804ea0d8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df879dc0 r5:df879e08 r4:df879dc0 [<804e9ef4>] (_vm_unmap_aliases) from [<804edd3c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9ef4>] (_vm_unmap_aliases) from [<804edd3c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85892180 r4:00000000 [<804edbd0>] (vfree) from [<80558a28>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:8321a400 r7:00000000 r6:83018600 r5:00001000 r4:7f280000 [<805589f8>] (execmem_free) from [<803c5f48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:e0143000 [<803c5f38>] (bpf_jit_free_exec) from [<803c6328>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f38>] (bpf_jit_free_exec) from [<803c6328>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c62c0>] (bpf_jit_free) from [<803c73d0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84705f8c r4:830cf000 [<803c7290>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84705f8c r4:830cf000 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:8321a400 r8:830cf02c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:830cf000 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:830cf000 r8:80278fec r7:df819d50 r6:830cf080 r5:8321a400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf879fb0 to 0xdf879ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:830cd200 INFO: task kworker/0:1:11199 blocked for more than 435 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1 state:D stack:0 pid:11199 tgid:11199 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63614>] (__schedule) from [<81a645a8>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a63614>] (__schedule) from [<81a645a8>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:dfb2dd84 r9:00000002 r8:60010113 r7:829171a0 r6:dfb2dd8c r5:84ee6000 r4:84ee6000 [<81a6457c>] (schedule) from [<81a64990>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:84ee6000 r4:8291719c [<81a64978>] (schedule_preempt_disabled) from [<81a67540>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64978>] (schedule_preempt_disabled) from [<81a67540>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a671f0>] (__mutex_lock.constprop.0) from [<81a67ce8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb2de08 r4:00000000 [<81a67cd4>] (__mutex_lock_slowpath) from [<81a67d28>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a67cec>] (mutex_lock) from [<804e9f5c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804e9ef4>] (_vm_unmap_aliases) from [<804edd3c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9ef4>] (_vm_unmap_aliases) from [<804edd3c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:860ef800 r4:00000000 [<804edbd0>] (vfree) from [<80558a28>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:84ee6000 r7:00000000 r6:83018400 r5:00001000 r4:7f282000 [<805589f8>] (execmem_free) from [<803c5f48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:e01a7000 [<803c5f38>] (bpf_jit_free_exec) from [<803c6328>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f38>] (bpf_jit_free_exec) from [<803c6328>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c62c0>] (bpf_jit_free) from [<803c73d0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85693f8c r4:8614be80 [<803c7290>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:85693f8c r4:8614be80 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84ee6000 r8:8614beac r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:8614be80 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8614be80 r8:80278fec r7:e00ede60 r6:8614be00 r5:84ee6000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb2dfb0 to 0xdfb2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:858152c0 INFO: task kworker/0:1:11199 is blocked on a mutex likely owned by task kworker/1:0:23. task:kworker/1:0 state:R running task stack:0 pid:23 tgid:23 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63614>] (__schedule) from [<81a649dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:8321a400 r8:80200c04 r7:df879d54 r6:ffffffff r5:8321a400 r4:00000000 [<81a6499c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdf879d20 to 0xdf879d68) 9d20: b4385000 ea637000 00000001 80239bf8 7f26e000 00000001 82acb1c4 82aca5a0 9d40: 7f26e000 ea637000 8280c9b4 df879d9c df879da0 df879d70 80230af0 80239c10 9d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804e9d20>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9a9c>] (__purge_vmap_area_lazy) from [<804ea0d8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df879dc0 r5:df879e08 r4:df879dc0 [<804e9ef4>] (_vm_unmap_aliases) from [<804edd3c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9ef4>] (_vm_unmap_aliases) from [<804edd3c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85892180 r4:00000000 [<804edbd0>] (vfree) from [<80558a28>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:8321a400 r7:00000000 r6:83018600 r5:00001000 r4:7f280000 [<805589f8>] (execmem_free) from [<803c5f48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:e0143000 [<803c5f38>] (bpf_jit_free_exec) from [<803c6328>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f38>] (bpf_jit_free_exec) from [<803c6328>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c62c0>] (bpf_jit_free) from [<803c73d0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84705f8c r4:830cf000 [<803c7290>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84705f8c r4:830cf000 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:8321a400 r8:830cf02c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:830cf000 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:830cf000 r8:80278fec r7:df819d50 r6:830cf080 r5:8321a400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf879fb0 to 0xdf879ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:830cd200 INFO: task kworker/0:4:11313 blocked for more than 438 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:4 state:D stack:0 pid:11313 tgid:11313 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63614>] (__schedule) from [<81a645a8>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a63614>] (__schedule) from [<81a645a8>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ea425d84 r9:00000002 r8:60000113 r7:829171a0 r6:ea425d8c r5:84ee6c00 r4:84ee6c00 [<81a6457c>] (schedule) from [<81a64990>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:84ee6c00 r4:8291719c [<81a64978>] (schedule_preempt_disabled) from [<81a67540>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64978>] (schedule_preempt_disabled) from [<81a67540>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a671f0>] (__mutex_lock.constprop.0) from [<81a67ce8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea425e08 r4:00000000 [<81a67cd4>] (__mutex_lock_slowpath) from [<81a67d28>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a67cec>] (mutex_lock) from [<804e9f5c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804e9ef4>] (_vm_unmap_aliases) from [<804edd3c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9ef4>] (_vm_unmap_aliases) from [<804edd3c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8471a0c0 r4:00000000 [<804edbd0>] (vfree) from [<80558a28>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:84ee6c00 r7:00000000 r6:83018400 r5:00001000 r4:7f28a000 [<805589f8>] (execmem_free) from [<803c5f48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:e427b000 [<803c5f38>] (bpf_jit_free_exec) from [<803c6328>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f38>] (bpf_jit_free_exec) from [<803c6328>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c62c0>] (bpf_jit_free) from [<803c73d0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:861be38c r4:8614b100 [<803c7290>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:861be38c r4:8614b100 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84ee6c00 r8:8614b12c r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:8614b100 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8614b100 r8:80278fec r7:e00ede60 r6:8614b880 r5:84ee6c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea425fb0 to 0xea425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:847bf8c0 INFO: task kworker/0:4:11313 is blocked on a mutex likely owned by task kworker/1:0:23. task:kworker/1:0 state:R running task stack:0 pid:23 tgid:23 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63614>] (__schedule) from [<81a649dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:8321a400 r8:80200c04 r7:df879d54 r6:ffffffff r5:8321a400 r4:00000000 [<81a6499c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdf879d20 to 0xdf879d68) 9d20: b4e83000 ea637000 00000001 80239bf8 7f26e000 00000001 82acb1c4 82aca5a0 9d40: 7f26e000 ea637000 8280c9b4 df879d9c df879da0 df879d70 80230af0 80239c10 9d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804e9d20>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9a9c>] (__purge_vmap_area_lazy) from [<804ea0d8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df879dc0 r5:df879e08 r4:df879dc0 [<804e9ef4>] (_vm_unmap_aliases) from [<804edd3c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9ef4>] (_vm_unmap_aliases) from [<804edd3c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85892180 r4:00000000 [<804edbd0>] (vfree) from [<80558a28>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:8321a400 r7:00000000 r6:83018600 r5:00001000 r4:7f280000 [<805589f8>] (execmem_free) from [<803c5f48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:e0143000 [<803c5f38>] (bpf_jit_free_exec) from [<803c6328>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f38>] (bpf_jit_free_exec) from [<803c6328>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c62c0>] (bpf_jit_free) from [<803c73d0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84705f8c r4:830cf000 [<803c7290>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84705f8c r4:830cf000 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:8321a400 r8:830cf02c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:830cf000 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:830cf000 r8:80278fec r7:df819d50 r6:830cf080 r5:8321a400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf879fb0 to 0xdf879ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:830cd200 INFO: task kworker/0:5:11399 blocked for more than 439 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:5 state:D stack:0 pid:11399 tgid:11399 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63614>] (__schedule) from [<81a645a8>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a63614>] (__schedule) from [<81a645a8>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:e014dd84 r9:00000002 r8:60000113 r7:829171a0 r6:e014dd8c r5:8382c800 r4:8382c800 [<81a6457c>] (schedule) from [<81a64990>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:8382c800 r4:8291719c [<81a64978>] (schedule_preempt_disabled) from [<81a67540>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64978>] (schedule_preempt_disabled) from [<81a67540>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a671f0>] (__mutex_lock.constprop.0) from [<81a67ce8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e014de08 r4:00000000 [<81a67cd4>] (__mutex_lock_slowpath) from [<81a67d28>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a67cec>] (mutex_lock) from [<804e9f5c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804e9ef4>] (_vm_unmap_aliases) from [<804edd3c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9ef4>] (_vm_unmap_aliases) from [<804edd3c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d9e1c0 r4:00000000 [<804edbd0>] (vfree) from [<80558a28>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:8382c800 r7:00000000 r6:83018400 r5:00001000 r4:7f270000 [<805589f8>] (execmem_free) from [<803c5f48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfc09000 [<803c5f38>] (bpf_jit_free_exec) from [<803c6328>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f38>] (bpf_jit_free_exec) from [<803c6328>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c62c0>] (bpf_jit_free) from [<803c73d0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:847d3b8c r4:8614b800 [<803c7290>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:847d3b8c r4:8614b800 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:8382c800 r8:8614b82c r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:8614b800 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8614b800 r8:80278fec r7:df9b5e60 r6:8614b780 r5:8382c800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe014dfb0 to 0xe014dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:860ef800 INFO: task kworker/0:5:11399 is blocked on a mutex likely owned by task kworker/1:0:23. task:kworker/1:0 state:R running task stack:0 pid:23 tgid:23 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63614>] (__schedule) from [<81a649dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:8321a400 r8:80200c04 r7:df879d54 r6:ffffffff r5:8321a400 r4:00000000 [<81a6499c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdf879d20 to 0xdf879d68) 9d20: b6109000 ea637000 00000001 80239bf8 7f26e000 00000001 82acb1c4 82aca5a0 9d40: 7f26e000 ea637000 8280c9b4 df879d9c df879da0 df879d70 80230af0 80239c10 9d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804e9d20>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9a9c>] (__purge_vmap_area_lazy) from [<804ea0d8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df879dc0 r5:df879e08 r4:df879dc0 [<804e9ef4>] (_vm_unmap_aliases) from [<804edd3c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9ef4>] (_vm_unmap_aliases) from [<804edd3c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85892180 r4:00000000 [<804edbd0>] (vfree) from [<80558a28>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:8321a400 r7:00000000 r6:83018600 r5:00001000 r4:7f280000 [<805589f8>] (execmem_free) from [<803c5f48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:e0143000 [<803c5f38>] (bpf_jit_free_exec) from [<803c6328>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f38>] (bpf_jit_free_exec) from [<803c6328>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c62c0>] (bpf_jit_free) from [<803c73d0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84705f8c r4:830cf000 [<803c7290>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84705f8c r4:830cf000 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:8321a400 r8:830cf02c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:830cf000 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:830cf000 r8:80278fec r7:df819d50 r6:830cf080 r5:8321a400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf879fb0 to 0xdf879ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:830cd200 INFO: task kworker/1:9:11448 blocked for more than 422 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:9 state:D stack:0 pid:11448 tgid:11448 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63614>] (__schedule) from [<81a645a8>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a63614>] (__schedule) from [<81a645a8>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ea339d84 r9:00000002 r8:60000113 r7:829171a0 r6:ea339d8c r5:84723000 r4:84723000 [<81a6457c>] (schedule) from [<81a64990>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:84723000 r4:8291719c [<81a64978>] (schedule_preempt_disabled) from [<81a67540>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64978>] (schedule_preempt_disabled) from [<81a67540>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a671f0>] (__mutex_lock.constprop.0) from [<81a67ce8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea339e08 r4:00000000 [<81a67cd4>] (__mutex_lock_slowpath) from [<81a67d28>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a67cec>] (mutex_lock) from [<804e9f5c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804e9ef4>] (_vm_unmap_aliases) from [<804edd3c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9ef4>] (_vm_unmap_aliases) from [<804edd3c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8480bdc0 r4:00000000 [<804edbd0>] (vfree) from [<80558a28>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84723000 r7:00000000 r6:83018600 r5:00001000 r4:7f274000 [<805589f8>] (execmem_free) from [<803c5f48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfbad000 [<803c5f38>] (bpf_jit_free_exec) from [<803c6328>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f38>] (bpf_jit_free_exec) from [<803c6328>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c62c0>] (bpf_jit_free) from [<803c73d0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84d9878c r4:85684780 [<803c7290>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84d9878c r4:85684780 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84723000 r8:856847ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85684780 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85684780 r8:80278fec r7:dfb31e60 r6:85684200 r5:84723000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea339fb0 to 0xea339ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:84d27180 INFO: task kworker/1:9:11448 is blocked on a mutex likely owned by task kworker/1:0:23. task:kworker/1:0 state:R running task stack:0 pid:23 tgid:23 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63614>] (__schedule) from [<81a649dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:8321a400 r8:80200c04 r7:df879d54 r6:ffffffff r5:8321a400 r4:00000000 [<81a6499c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdf879d20 to 0xdf879d68) 9d20: b6109000 ea637000 00000001 80239bf8 7f26e000 00000001 82acb1c4 82aca5a0 9d40: 7f26e000 ea637000 8280c9b4 df879d9c df879da0 df879d70 80230af0 80239c10 9d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804e9d20>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9a9c>] (__purge_vmap_area_lazy) from [<804ea0d8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df879dc0 r5:df879e08 r4:df879dc0 [<804e9ef4>] (_vm_unmap_aliases) from [<804edd3c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9ef4>] (_vm_unmap_aliases) from [<804edd3c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85892180 r4:00000000 [<804edbd0>] (vfree) from [<80558a28>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:8321a400 r7:00000000 r6:83018600 r5:00001000 r4:7f280000 [<805589f8>] (execmem_free) from [<803c5f48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:e0143000 [<803c5f38>] (bpf_jit_free_exec) from [<803c6328>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f38>] (bpf_jit_free_exec) from [<803c6328>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c62c0>] (bpf_jit_free) from [<803c73d0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84705f8c r4:830cf000 [<803c7290>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84705f8c r4:830cf000 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:8321a400 r8:830cf02c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:830cf000 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:830cf000 r8:80278fec r7:df819d50 r6:830cf080 r5:8321a400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf879fb0 to 0xdf879ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:830cd200 INFO: task kworker/0:6:11452 blocked for more than 442 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:6 state:D stack:0 pid:11452 tgid:11452 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63614>] (__schedule) from [<81a645a8>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a63614>] (__schedule) from [<81a645a8>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:dfb3dd84 r9:00000002 r8:60000013 r7:829171a0 r6:dfb3dd8c r5:83a99800 r4:83a99800 [<81a6457c>] (schedule) from [<81a64990>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:83a99800 r4:8291719c [<81a64978>] (schedule_preempt_disabled) from [<81a67540>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64978>] (schedule_preempt_disabled) from [<81a67540>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a671f0>] (__mutex_lock.constprop.0) from [<81a67ce8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb3de08 r4:00000000 [<81a67cd4>] (__mutex_lock_slowpath) from [<81a67d28>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a67cec>] (mutex_lock) from [<804e9f5c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804e9ef4>] (_vm_unmap_aliases) from [<804edd3c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9ef4>] (_vm_unmap_aliases) from [<804edd3c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b48e00 r4:00000000 [<804edbd0>] (vfree) from [<80558a28>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:83a99800 r7:00000000 r6:83018400 r5:00001000 r4:7f288000 [<805589f8>] (execmem_free) from [<803c5f48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:e4253000 [<803c5f38>] (bpf_jit_free_exec) from [<803c6328>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f38>] (bpf_jit_free_exec) from [<803c6328>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c62c0>] (bpf_jit_free) from [<803c73d0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85691b8c r4:8614b700 [<803c7290>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:85691b8c r4:8614b700 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:83a99800 r8:8614b72c r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:8614b700 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8614b700 r8:80278fec r7:e014de60 r6:85684c00 r5:83a99800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb3dfb0 to 0xdfb3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:858685c0 INFO: task kworker/0:6:11452 is blocked on a mutex likely owned by task kworker/1:0:23. task:kworker/1:0 state:R running task stack:0 pid:23 tgid:23 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63614>] (__schedule) from [<81a649dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:8321a400 r8:80200c04 r7:df879d54 r6:ffffffff r5:8321a400 r4:00000000 [<81a6499c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdf879d20 to 0xdf879d68) 9d20: b8b0c000 ea637000 00000001 80239bf8 7f26e000 00000001 82acb1c4 82aca5a0 9d40: 7f26e000 ea637000 8280c9b4 df879d9c df879da0 df879d70 80230af0 80239c10 9d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804e9d20>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9a9c>] (__purge_vmap_area_lazy) from [<804ea0d8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df879dc0 r5:df879e08 r4:df879dc0 [<804e9ef4>] (_vm_unmap_aliases) from [<804edd3c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9ef4>] (_vm_unmap_aliases) from [<804edd3c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85892180 r4:00000000 [<804edbd0>] (vfree) from [<80558a28>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:8321a400 r7:00000000 r6:83018600 r5:00001000 r4:7f280000 [<805589f8>] (execmem_free) from [<803c5f48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:e0143000 [<803c5f38>] (bpf_jit_free_exec) from [<803c6328>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f38>] (bpf_jit_free_exec) from [<803c6328>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c62c0>] (bpf_jit_free) from [<803c73d0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84705f8c r4:830cf000 [<803c7290>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84705f8c r4:830cf000 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:8321a400 r8:830cf02c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:830cf000 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:830cf000 r8:80278fec r7:df819d50 r6:830cf080 r5:8321a400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf879fb0 to 0xdf879ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:830cd200 INFO: task kworker/0:7:12531 blocked for more than 426 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:7 state:D stack:0 pid:12531 tgid:12531 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63614>] (__schedule) from [<81a645a8>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a63614>] (__schedule) from [<81a645a8>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:dfba5d84 r9:00000002 r8:60000113 r7:829171a0 r6:dfba5d8c r5:83aa5400 r4:83aa5400 [<81a6457c>] (schedule) from [<81a64990>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:83aa5400 r4:8291719c [<81a64978>] (schedule_preempt_disabled) from [<81a67540>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64978>] (schedule_preempt_disabled) from [<81a67540>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a671f0>] (__mutex_lock.constprop.0) from [<81a67ce8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfba5e08 r4:00000000 [<81a67cd4>] (__mutex_lock_slowpath) from [<81a67d28>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a67cec>] (mutex_lock) from [<804e9f5c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804e9ef4>] (_vm_unmap_aliases) from [<804edd3c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9ef4>] (_vm_unmap_aliases) from [<804edd3c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfeb00 r4:00000000 [<804edbd0>] (vfree) from [<80558a28>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:83aa5400 r7:00000000 r6:83018400 r5:00001000 r4:7f26e000 [<805589f8>] (execmem_free) from [<803c5f48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:df907000 [<803c5f38>] (bpf_jit_free_exec) from [<803c6328>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f38>] (bpf_jit_free_exec) from [<803c6328>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c62c0>] (bpf_jit_free) from [<803c73d0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:8470478c r4:85708f80 [<803c7290>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:8470478c r4:85708f80 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:83aa5400 r8:85708fac r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:85708f80 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85708f80 r8:80278fec r7:e014de60 r6:84699000 r5:83aa5400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfba5fb0 to 0xdfba5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:858a1d40 INFO: task kworker/0:7:12531 is blocked on a mutex likely owned by task kworker/1:0:23. task:kworker/1:0 state:R running task stack:0 pid:23 tgid:23 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63614>] (__schedule) from [<81a649dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:8321a400 r8:80200c04 r7:df879d54 r6:ffffffff r5:8321a400 r4:00000000 [<81a6499c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdf879d20 to 0xdf879d68) 9d20: b8bbc000 ea637000 00000001 80239bf8 7f26e000 00000001 82acb1c4 82aca5a0 9d40: 7f26e000 ea637000 8280c9b4 df879d9c df879da0 df879d70 80230af0 80239c10 9d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804e9d20>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9a9c>] (__purge_vmap_area_lazy) from [<804ea0d8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df879dc0 r5:df879e08 r4:df879dc0 [<804e9ef4>] (_vm_unmap_aliases) from [<804edd3c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9ef4>] (_vm_unmap_aliases) from [<804edd3c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85892180 r4:00000000 [<804edbd0>] (vfree) from [<80558a28>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:8321a400 r7:00000000 r6:83018600 r5:00001000 r4:7f280000 [<805589f8>] (execmem_free) from [<803c5f48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:e0143000 [<803c5f38>] (bpf_jit_free_exec) from [<803c6328>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f38>] (bpf_jit_free_exec) from [<803c6328>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c62c0>] (bpf_jit_free) from [<803c73d0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84705f8c r4:830cf000 [<803c7290>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84705f8c r4:830cf000 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:8321a400 r8:830cf02c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:830cf000 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:830cf000 r8:80278fec r7:df819d50 r6:830cf080 r5:8321a400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf879fb0 to 0xdf879ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:830cd200 INFO: task kworker/0:9:12540 blocked for more than 426 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:9 state:D stack:0 pid:12540 tgid:12540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63614>] (__schedule) from [<81a645a8>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a63614>] (__schedule) from [<81a645a8>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:e82d1d84 r9:00000002 r8:60000113 r7:829171a0 r6:e82d1d8c r5:84ee4800 r4:84ee4800 [<81a6457c>] (schedule) from [<81a64990>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:84ee4800 r4:8291719c [<81a64978>] (schedule_preempt_disabled) from [<81a67540>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64978>] (schedule_preempt_disabled) from [<81a67540>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a671f0>] (__mutex_lock.constprop.0) from [<81a67ce8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e82d1e08 r4:00000000 [<81a67cd4>] (__mutex_lock_slowpath) from [<81a67d28>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a67cec>] (mutex_lock) from [<804e9f5c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804e9ef4>] (_vm_unmap_aliases) from [<804edd3c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9ef4>] (_vm_unmap_aliases) from [<804edd3c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85882d00 r4:00000000 [<804edbd0>] (vfree) from [<80558a28>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:84ee4800 r7:00000000 r6:83018400 r5:00001000 r4:7f272000 [<805589f8>] (execmem_free) from [<803c5f48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfaeb000 [<803c5f38>] (bpf_jit_free_exec) from [<803c6328>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f38>] (bpf_jit_free_exec) from [<803c6328>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c62c0>] (bpf_jit_free) from [<803c73d0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84c3978c r4:85708780 [<803c7290>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:84c3978c r4:85708780 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84ee4800 r8:857087ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:85708780 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85708780 r8:80278fec r7:df9b5e60 r6:84699d80 r5:84ee4800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe82d1fb0 to 0xe82d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:8580e640 INFO: task kworker/0:9:12540 is blocked on a mutex likely owned by task kworker/1:0:23. task:kworker/1:0 state:R running task stack:0 pid:23 tgid:23 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63614>] (__schedule) from [<81a649dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:8321a400 r8:80200c04 r7:df879d54 r6:ffffffff r5:8321a400 r4:00000000 [<81a6499c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdf879d20 to 0xdf879d68) 9d20: b8bbc000 ea637000 00000001 80239bf8 7f26e000 00000001 82acb1c4 82aca5a0 9d40: 7f26e000 ea637000 8280c9b4 df879d9c df879da0 df879d70 80230af0 80239c10 9d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804e9d20>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9a9c>] (__purge_vmap_area_lazy) from [<804ea0d8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df879dc0 r5:df879e08 r4:df879dc0 [<804e9ef4>] (_vm_unmap_aliases) from [<804edd3c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9ef4>] (_vm_unmap_aliases) from [<804edd3c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85892180 r4:00000000 [<804edbd0>] (vfree) from [<80558a28>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:8321a400 r7:00000000 r6:83018600 r5:00001000 r4:7f280000 [<805589f8>] (execmem_free) from [<803c5f48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:e0143000 [<803c5f38>] (bpf_jit_free_exec) from [<803c6328>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f38>] (bpf_jit_free_exec) from [<803c6328>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c62c0>] (bpf_jit_free) from [<803c73d0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84705f8c r4:830cf000 [<803c7290>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84705f8c r4:830cf000 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:8321a400 r8:830cf02c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:830cf000 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:830cf000 r8:80278fec r7:df819d50 r6:830cf080 r5:8321a400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf879fb0 to 0xdf879ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:830cd200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:12:12565 blocked for more than 426 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:12 state:D stack:0 pid:12565 tgid:12565 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63614>] (__schedule) from [<81a645a8>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a63614>] (__schedule) from [<81a645a8>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:e00d5d84 r9:00000002 r8:60000013 r7:829171a0 r6:e00d5d8c r5:8383d400 r4:8383d400 [<81a6457c>] (schedule) from [<81a64990>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:8383d400 r4:8291719c [<81a64978>] (schedule_preempt_disabled) from [<81a67540>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64978>] (schedule_preempt_disabled) from [<81a67540>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a671f0>] (__mutex_lock.constprop.0) from [<81a67ce8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00d5e08 r4:00000000 [<81a67cd4>] (__mutex_lock_slowpath) from [<81a67d28>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a67cec>] (mutex_lock) from [<804e9f5c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804e9ef4>] (_vm_unmap_aliases) from [<804edd3c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9ef4>] (_vm_unmap_aliases) from [<804edd3c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85882a00 r4:00000000 [<804edbd0>] (vfree) from [<80558a28>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:8383d400 r7:00000000 r6:83018400 r5:00001000 r4:7f26e000 [<805589f8>] (execmem_free) from [<803c5f48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfb27000 [<803c5f38>] (bpf_jit_free_exec) from [<803c6328>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f38>] (bpf_jit_free_exec) from [<803c6328>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c62c0>] (bpf_jit_free) from [<803c73d0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84c39f8c r4:85708680 [<803c7290>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:84c39f8c r4:85708680 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:8383d400 r8:857086ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:85708680 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85708680 r8:80278fec r7:e00d1e60 r6:85708180 r5:8383d400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00d5fb0 to 0xe00d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:8471a2c0 INFO: task kworker/0:12:12565 is blocked on a mutex likely owned by task kworker/1:0:23. task:kworker/1:0 state:R running task stack:0 pid:23 tgid:23 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63614>] (__schedule) from [<81a649dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:8321a400 r8:80200c04 r7:df879d54 r6:ffffffff r5:8321a400 r4:00000000 [<81a6499c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdf879d20 to 0xdf879d68) 9d20: b8bbc000 ea637000 00000001 80239bf8 7f26e000 00000001 82acb1c4 82aca5a0 9d40: 7f26e000 ea637000 8280c9b4 df879d9c df879da0 df879d70 80230af0 80239c10 9d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804e9d20>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9a9c>] (__purge_vmap_area_lazy) from [<804ea0d8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df879dc0 r5:df879e08 r4:df879dc0 [<804e9ef4>] (_vm_unmap_aliases) from [<804edd3c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9ef4>] (_vm_unmap_aliases) from [<804edd3c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85892180 r4:00000000 [<804edbd0>] (vfree) from [<80558a28>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:8321a400 r7:00000000 r6:83018600 r5:00001000 r4:7f280000 [<805589f8>] (execmem_free) from [<803c5f48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:e0143000 [<803c5f38>] (bpf_jit_free_exec) from [<803c6328>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f38>] (bpf_jit_free_exec) from [<803c6328>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c62c0>] (bpf_jit_free) from [<803c73d0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84705f8c r4:830cf000 [<803c7290>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84705f8c r4:830cf000 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:8321a400 r8:830cf02c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:830cf000 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:830cf000 r8:80278fec r7:df819d50 r6:830cf080 r5:8321a400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf879fb0 to 0xdf879ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:830cd200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 30 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT Hardware name: ARM-Versatile Express Call trace: [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c arch/arm/kernel/traps.c:257) r7:00000000 r6:000d0013 r5:600d0093 r4:82252544 [<80201b08>] (show_stack) from [<8021f8b0>] (__dump_stack lib/dump_stack.c:94 [inline]) [<80201b08>] (show_stack) from [<8021f8b0>] (dump_stack_lvl+0x70/0x7c lib/dump_stack.c:120) [<8021f840>] (dump_stack_lvl) from [<8021f8d4>] (dump_stack+0x18/0x1c lib/dump_stack.c:129) r5:00000001 r4:00000001 [<8021f8bc>] (dump_stack) from [<81a4d22c>] (nmi_cpu_backtrace+0x160/0x17c lib/nmi_backtrace.c:113) [<81a4d0cc>] (nmi_cpu_backtrace) from [<81a4d378>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8 lib/nmi_backtrace.c:62) r7:00000001 r6:8280c690 r5:8281ae34 r4:ffffffff [<81a4d248>] (nmi_trigger_cpumask_backtrace) from [<802304fc>] (arch_trigger_cpumask_backtrace+0x18/0x1c arch/arm/kernel/smp.c:852) r9:8281ba28 r8:8280c810 r7:000252d7 r6:00007f0f r5:82abf7d4 r4:833ca60c [<802304e4>] (arch_trigger_cpumask_backtrace) from [<8037fab0>] (trigger_all_cpu_backtrace include/linux/nmi.h:160 [inline]) [<802304e4>] (arch_trigger_cpumask_backtrace) from [<8037fab0>] (check_hung_uninterruptible_tasks kernel/hung_task.c:332 [inline]) [<802304e4>] (arch_trigger_cpumask_backtrace) from [<8037fab0>] (watchdog+0x5d0/0x850 kernel/hung_task.c:495) [<8037f4e0>] (watchdog) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:00000000 r8:8037f4e0 r7:832a1b80 r6:832a1b80 r5:832ea400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf8d9fb0 to 0xdf8d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:8333d400 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 10517 Comm: kworker/u8:6 Not tainted syzkaller #0 PREEMPT Hardware name: ARM-Versatile Express Workqueue: events_unbound nsim_dev_trap_report_work PC is at cookie_hash+0x0/0xe0 net/ipv6/syncookies.c:44 LR is at secure_tcp_syn_cookie net/ipv6/syncookies.c:72 [inline] LR is at __cookie_v6_init_sequence+0x104/0x140 net/ipv6/syncookies.c:105 pc : [<818a1570>] lr : [<818a187c>] psr: 600f0013 sp : df801b20 ip : 00000001 fp : df801b6c r10: 00000000 r9 : 00000001 r8 : 000252da r7 : bf727a88 r6 : 000aec4d r5 : aec33e1f r4 : 671529a5 r3 : 0000224e r2 : 0000224e r1 : 861ec598 r0 : 861ec588 Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user Control: 30c5387d Table: 855cb300 DAC: fffffffd Call trace: frame pointer underflow [<818a1778>] (__cookie_v6_init_sequence) from [<816e56a0>] (nf_ipv6_cookie_init_sequence include/linux/netfilter_ipv6.h:175 [inline]) [<818a1778>] (__cookie_v6_init_sequence) from [<816e56a0>] (synproxy_send_client_synack_ipv6+0x104/0x1e8 net/netfilter/nf_synproxy_core.c:885) r10:861ed0e8 r9:861ec580 r8:861ec5a8 r7:df801bd0 r6:85623600 r5:00000014 r4:85623d80 [<816e559c>] (synproxy_send_client_synack_ipv6) from [<81720fa8>] (nft_synproxy_eval_v6 net/netfilter/nft_synproxy.c:90 [inline]) [<816e559c>] (synproxy_send_client_synack_ipv6) from [<81720fa8>] (nft_synproxy_do_eval+0x29c/0x2b4 net/netfilter/nft_synproxy.c:145) r10:81e63408 r9:861ec5a8 r8:858b9600 r7:84fd5f98 r6:df801c9c r5:84903c00 r4:85623600 [<81720d0c>] (nft_synproxy_do_eval) from [<81720fec>] (nft_synproxy_eval+0x14/0x18 net/netfilter/nft_synproxy.c:247) r9:df801d34 r8:81e63590 r7:81e632f4 r6:81e632b0 r5:84fd5fa0 r4:84fd5f90 [<81720fd8>] (nft_synproxy_eval) from [<816e85bc>] (expr_call_ops_eval net/netfilter/nf_tables_core.c:237 [inline]) [<81720fd8>] (nft_synproxy_eval) from [<816e85bc>] (nft_do_chain+0x12c/0x570 net/netfilter/nf_tables_core.c:285) [<816e8490>] (nft_do_chain) from [<817024c0>] (nft_do_chain_inet+0xac/0x120 net/netfilter/nft_chain_filter.c:161) r10:dddd0ec8 r9:84a16220 r8:df801d8c r7:85623600 r6:84a16200 r5:00000004 r4:858cd280 [<81702414>] (nft_do_chain_inet) from [<816afbd0>] (nf_hook_entry_hookfn include/linux/netfilter.h:158 [inline]) [<81702414>] (nft_do_chain_inet) from [<816afbd0>] (nf_hook_slow+0x40/0x104 net/netfilter/core.c:623) r4:00000001 [<816afb90>] (nf_hook_slow) from [<81849ee4>] (nf_hook include/linux/netfilter.h:273 [inline]) [<816afb90>] (nf_hook_slow) from [<81849ee4>] (NF_HOOK include/linux/netfilter.h:316 [inline]) [<816afb90>] (nf_hook_slow) from [<81849ee4>] (ip6_input+0xb8/0xd8 net/ipv6/ip6_input.c:500) r9:00000040 r8:0000003d r7:00000000 r6:84903c00 r5:856cc000 r4:85623600 [<81849e2c>] (ip6_input) from [<81849338>] (dst_input include/net/dst.h:474 [inline]) [<81849e2c>] (ip6_input) from [<81849338>] (ip6_rcv_finish net/ipv6/ip6_input.c:79 [inline]) [<81849e2c>] (ip6_input) from [<81849338>] (NF_HOOK include/linux/netfilter.h:318 [inline]) [<81849e2c>] (ip6_input) from [<81849338>] (NF_HOOK include/linux/netfilter.h:312 [inline]) [<81849e2c>] (ip6_input) from [<81849338>] (ipv6_rcv+0x150/0x15c net/ipv6/ip6_input.c:311) r6:84903c00 r5:85623600 r4:00000001 [<818491e8>] (ipv6_rcv) from [<8158f690>] (__netif_receive_skb_one_core+0x5c/0x80 net/core/dev.c:6079) r6:00000000 r5:818491e8 r4:856cc000 [<8158f634>] (__netif_receive_skb_one_core) from [<8158f6fc>] (__netif_receive_skb+0x18/0x5c net/core/dev.c:6192) r5:dddd0fb0 r4:85623600 [<8158f6e4>] (__netif_receive_skb) from [<8158fa04>] (process_backlog+0xa0/0x17c net/core/dev.c:6544) r5:dddd0fb0 r4:85623600 [<8158f964>] (process_backlog) from [<81590264>] (__napi_poll+0x34/0x240 net/core/dev.c:7594) r10:00000000 r9:df801ed8 r8:00000000 r7:df801ed3 r6:00000040 r5:dddd0fb0 r4:00000001 [<81590230>] (__napi_poll) from [<81590abc>] (napi_poll net/core/dev.c:7657 [inline]) [<81590230>] (__napi_poll) from [<81590abc>] (net_rx_action+0x358/0x3ec net/core/dev.c:7784) r9:df801ed8 r8:00000000 r7:0000012c r6:5b70d000 r5:dddd0fb0 r4:ffffffff [<81590764>] (net_rx_action) from [<8025be24>] (handle_softirqs+0x140/0x458 kernel/softirq.c:622) r10:856aa400 r9:82804d40 r8:00000102 r7:00000003 r6:00000002 r5:00000002 r4:8280408c [<8025bce4>] (handle_softirqs) from [<802012f0>] (__do_softirq+0x14/0x18 kernel/softirq.c:656) r10:860ebd00 r9:8489b080 r8:860ebe00 r7:00000040 r6:81d95fa8 r5:00000002 r4:600f0013 [<802012dc>] (__do_softirq) from [<8022858c>] (____do_softirq+0x10/0x14 arch/arm/kernel/irq.c:77) [<8022857c>] (____do_softirq) from [<81a302f4>] (call_with_stack+0x1c/0x20 arch/arm/lib/call_with_stack.S:40) [<81a302d8>] (call_with_stack) from [<802285c8>] (do_softirq_own_stack+0x38/0x3c arch/arm/kernel/irq.c:82) [<80228590>] (do_softirq_own_stack) from [<8025c42c>] (do_softirq kernel/softirq.c:523 [inline]) [<80228590>] (do_softirq_own_stack) from [<8025c42c>] (do_softirq+0x5c/0x64 kernel/softirq.c:510) [<8025c3d0>] (do_softirq) from [<8025c500>] (__local_bh_enable_ip+0xcc/0xd0 kernel/softirq.c:450) r5:00000002 r4:856aa400 [<8025c434>] (__local_bh_enable_ip) from [<81a6d330>] (__raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline]) [<8025c434>] (__local_bh_enable_ip) from [<81a6d330>] (_raw_spin_unlock_bh+0x34/0x38 kernel/locking/spinlock.c:210) r5:8489bc40 r4:85623cc0 [<81a6d2fc>] (_raw_spin_unlock_bh) from [<80e606dc>] (spin_unlock_bh include/linux/spinlock.h:396 [inline]) [<81a6d2fc>] (_raw_spin_unlock_bh) from [<80e606dc>] (nsim_dev_trap_report drivers/net/netdevsim/dev.c:835 [inline]) [<81a6d2fc>] (_raw_spin_unlock_bh) from [<80e606dc>] (nsim_dev_trap_report_work+0x2e4/0x410 drivers/net/netdevsim/dev.c:866) [<80e603f8>] (nsim_dev_trap_report_work) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r10:8300e870 r9:83019805 r8:856aa400 r7:8300e600 r6:83019800 r5:8489b080 r4:832c7100 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:856aa400 r8:832c712c r7:82804d40 r6:8300e600 r5:8300e620 r4:832c7100 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:832c7100 r8:80278fec r7:dfbf5e60 r6:8472a480 r5:856aa400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0071fb0 to 0xe0071ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:8616eb40