INFO: task kworker/1:137:4584 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:137 state:D stack:0 pid:4584 tgid:4584 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63614>] (__schedule) from [<81a645a8>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a63614>] (__schedule) from [<81a645a8>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ea3bdd84 r9:00000002 r8:60000013 r7:829171a0 r6:ea3bdd8c r5:855f0000 r4:855f0000 [<81a6457c>] (schedule) from [<81a64990>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:855f0000 r4:8291719c [<81a64978>] (schedule_preempt_disabled) from [<81a67540>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64978>] (schedule_preempt_disabled) from [<81a67540>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a671f0>] (__mutex_lock.constprop.0) from [<81a67ce8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea3bde08 r4:00000000 [<81a67cd4>] (__mutex_lock_slowpath) from [<81a67d28>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a67cec>] (mutex_lock) from [<804e9f5c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804e9ef4>] (_vm_unmap_aliases) from [<804edd3c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9ef4>] (_vm_unmap_aliases) from [<804edd3c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859dd900 r4:00000000 [<804edbd0>] (vfree) from [<80558a28>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:855f0000 r7:00000000 r6:83018600 r5:00001000 r4:7f077000 [<805589f8>] (execmem_free) from [<803c5f48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea6a3000 [<803c5f38>] (bpf_jit_free_exec) from [<803c6328>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f38>] (bpf_jit_free_exec) from [<803c6328>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c62c0>] (bpf_jit_free) from [<803c73d0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85981f8c r4:8599f480 [<803c7290>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:85981f8c r4:8599f480 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:855f0000 r8:8599f4ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:8599f480 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8599f480 r8:80278fec r7:ea47de60 r6:8599c800 r5:855f0000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea3bdfb0 to 0xea3bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:859ddcc0 INFO: task kworker/1:137:4584 is blocked on a mutex likely owned by task kworker/0:81:4602. task:kworker/0:81 state:R running task stack:0 pid:4602 tgid:4602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63614>] (__schedule) from [<81a649dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:849ec800 r8:80200c04 r7:ea641d54 r6:ffffffff r5:849ec800 r4:00000000 [<81a6499c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea641d20 to 0xea641d68) 1d20: 8b5c3000 ebecd000 00000001 80239bf8 7f047000 00000001 82acb1c4 82aca5a0 1d40: 7f047000 ebecd000 8280c9b4 ea641d9c ea641da0 ea641d70 80230af0 80239c10 1d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804e9d20>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9a9c>] (__purge_vmap_area_lazy) from [<804ea0d8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea641dc0 r5:ea641e08 r4:ea641dc0 [<804e9ef4>] (_vm_unmap_aliases) from [<804edd3c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9ef4>] (_vm_unmap_aliases) from [<804edd3c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8592da00 r4:00000000 [<804edbd0>] (vfree) from [<80558a28>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:849ec800 r7:00000000 r6:83018400 r5:00001000 r4:7f073000 [<805589f8>] (execmem_free) from [<803c5f48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea643000 [<803c5f38>] (bpf_jit_free_exec) from [<803c6328>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f38>] (bpf_jit_free_exec) from [<803c6328>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c62c0>] (bpf_jit_free) from [<803c73d0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85c1ab8c r4:8599ce00 [<803c7290>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:85c1ab8c r4:8599ce00 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:849ec800 r8:8599ce2c r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:8599ce00 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8599ce00 r8:80278fec r7:ea621e60 r6:8599ce80 r5:849ec800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea641fb0 to 0xea641ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:8595c7c0 INFO: task kworker/1:139:4594 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:139 state:D stack:0 pid:4594 tgid:4594 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63614>] (__schedule) from [<81a645a8>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a63614>] (__schedule) from [<81a645a8>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ea5b1d84 r9:00000002 r8:60000113 r7:829171a0 r6:ea5b1d8c r5:849e8000 r4:849e8000 [<81a6457c>] (schedule) from [<81a64990>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:849e8000 r4:8291719c [<81a64978>] (schedule_preempt_disabled) from [<81a67540>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64978>] (schedule_preempt_disabled) from [<81a67540>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a671f0>] (__mutex_lock.constprop.0) from [<81a67ce8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea5b1e08 r4:00000000 [<81a67cd4>] (__mutex_lock_slowpath) from [<81a67d28>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a67cec>] (mutex_lock) from [<804e9f5c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804e9ef4>] (_vm_unmap_aliases) from [<804edd3c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9ef4>] (_vm_unmap_aliases) from [<804edd3c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858ca740 r4:00000000 [<804edbd0>] (vfree) from [<80558a28>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:849e8000 r7:00000000 r6:83018600 r5:00001000 r4:7f07b000 [<805589f8>] (execmem_free) from [<803c5f48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea6f9000 [<803c5f38>] (bpf_jit_free_exec) from [<803c6328>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f38>] (bpf_jit_free_exec) from [<803c6328>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c62c0>] (bpf_jit_free) from [<803c73d0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85973b8c r4:8599f580 [<803c7290>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:85973b8c r4:8599f580 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:849e8000 r8:8599f5ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:8599f580 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8599f580 r8:80278fec r7:ea3bde60 r6:8599ca80 r5:849e8000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea5b1fb0 to 0xea5b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:859dd7c0 INFO: task kworker/1:139:4594 is blocked on a mutex likely owned by task kworker/0:81:4602. task:kworker/0:81 state:R running task stack:0 pid:4602 tgid:4602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63614>] (__schedule) from [<81a649dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:849ec800 r8:80200c04 r7:ea641d54 r6:ffffffff r5:849ec800 r4:00000000 [<81a6499c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea641d20 to 0xea641d68) 1d20: 8c913000 ebecd000 00000001 80239bf8 7f047000 00000001 82acb1c4 82aca5a0 1d40: 7f047000 ebecd000 8280c9b4 ea641d9c ea641da0 ea641d70 80230af0 80239c10 1d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804e9d20>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9a9c>] (__purge_vmap_area_lazy) from [<804ea0d8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea641dc0 r5:ea641e08 r4:ea641dc0 [<804e9ef4>] (_vm_unmap_aliases) from [<804edd3c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9ef4>] (_vm_unmap_aliases) from [<804edd3c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8592da00 r4:00000000 [<804edbd0>] (vfree) from [<80558a28>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:849ec800 r7:00000000 r6:83018400 r5:00001000 r4:7f073000 [<805589f8>] (execmem_free) from [<803c5f48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea643000 [<803c5f38>] (bpf_jit_free_exec) from [<803c6328>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f38>] (bpf_jit_free_exec) from [<803c6328>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c62c0>] (bpf_jit_free) from [<803c73d0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85c1ab8c r4:8599ce00 [<803c7290>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:85c1ab8c r4:8599ce00 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:849ec800 r8:8599ce2c r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:8599ce00 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8599ce00 r8:80278fec r7:ea621e60 r6:8599ce80 r5:849ec800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea641fb0 to 0xea641ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:8595c7c0 INFO: task kworker/0:80:4600 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:80 state:D stack:0 pid:4600 tgid:4600 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63614>] (__schedule) from [<81a645a8>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a63614>] (__schedule) from [<81a645a8>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ea621d84 r9:00000002 r8:60000113 r7:829171a0 r6:ea621d8c r5:849ebc00 r4:849ebc00 [<81a6457c>] (schedule) from [<81a64990>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:849ebc00 r4:8291719c [<81a64978>] (schedule_preempt_disabled) from [<81a67540>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64978>] (schedule_preempt_disabled) from [<81a67540>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a671f0>] (__mutex_lock.constprop.0) from [<81a67ce8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea621e08 r4:00000000 [<81a67cd4>] (__mutex_lock_slowpath) from [<81a67d28>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a67cec>] (mutex_lock) from [<804e9f5c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804e9ef4>] (_vm_unmap_aliases) from [<804edd3c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9ef4>] (_vm_unmap_aliases) from [<804edd3c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859d9fc0 r4:00000000 [<804edbd0>] (vfree) from [<80558a28>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:849ebc00 r7:00000000 r6:83018400 r5:00001000 r4:7f07d000 [<805589f8>] (execmem_free) from [<803c5f48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea735000 [<803c5f38>] (bpf_jit_free_exec) from [<803c6328>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f38>] (bpf_jit_free_exec) from [<803c6328>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c62c0>] (bpf_jit_free) from [<803c73d0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85c18b8c r4:8599cd00 [<803c7290>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:85c18b8c r4:8599cd00 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:849ebc00 r8:8599cd2c r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:8599cd00 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8599cd00 r8:80278fec r7:ea605e60 r6:8599cd80 r5:849ebc00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea621fb0 to 0xea621ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:8595ec00 INFO: task kworker/0:80:4600 is blocked on a mutex likely owned by task kworker/0:81:4602. task:kworker/0:81 state:R running task stack:0 pid:4602 tgid:4602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63614>] (__schedule) from [<81a649dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:849ec800 r8:80200c04 r7:ea641d54 r6:ffffffff r5:849ec800 r4:00000000 [<81a6499c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea641d20 to 0xea641d68) 1d20: 8c913000 ebecd000 00000001 80239bf8 7f047000 00000001 82acb1c4 82aca5a0 1d40: 7f047000 ebecd000 8280c9b4 ea641d9c ea641da0 ea641d70 80230af0 80239c10 1d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804e9d20>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9a9c>] (__purge_vmap_area_lazy) from [<804ea0d8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea641dc0 r5:ea641e08 r4:ea641dc0 [<804e9ef4>] (_vm_unmap_aliases) from [<804edd3c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9ef4>] (_vm_unmap_aliases) from [<804edd3c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8592da00 r4:00000000 [<804edbd0>] (vfree) from [<80558a28>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:849ec800 r7:00000000 r6:83018400 r5:00001000 r4:7f073000 [<805589f8>] (execmem_free) from [<803c5f48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea643000 [<803c5f38>] (bpf_jit_free_exec) from [<803c6328>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f38>] (bpf_jit_free_exec) from [<803c6328>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c62c0>] (bpf_jit_free) from [<803c73d0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85c1ab8c r4:8599ce00 [<803c7290>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:85c1ab8c r4:8599ce00 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:849ec800 r8:8599ce2c r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:8599ce00 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8599ce00 r8:80278fec r7:ea621e60 r6:8599ce80 r5:849ec800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea641fb0 to 0xea641ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:8595c7c0 INFO: task kworker/1:140:4605 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:140 state:D stack:0 pid:4605 tgid:4605 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63614>] (__schedule) from [<81a645a8>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a63614>] (__schedule) from [<81a645a8>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ea671d84 r9:00000002 r8:60000113 r7:829171a0 r6:ea671d8c r5:849ed400 r4:849ed400 [<81a6457c>] (schedule) from [<81a64990>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:849ed400 r4:8291719c [<81a64978>] (schedule_preempt_disabled) from [<81a67540>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64978>] (schedule_preempt_disabled) from [<81a67540>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a671f0>] (__mutex_lock.constprop.0) from [<81a67ce8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea671e08 r4:00000000 [<81a67cd4>] (__mutex_lock_slowpath) from [<81a67d28>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a67cec>] (mutex_lock) from [<804e9f5c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804e9ef4>] (_vm_unmap_aliases) from [<804edd3c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9ef4>] (_vm_unmap_aliases) from [<804edd3c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859dd9c0 r4:00000000 [<804edbd0>] (vfree) from [<80558a28>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:849ed400 r7:00000000 r6:83018600 r5:00001000 r4:7f075000 [<805589f8>] (execmem_free) from [<803c5f48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea669000 [<803c5f38>] (bpf_jit_free_exec) from [<803c6328>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f38>] (bpf_jit_free_exec) from [<803c6328>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c62c0>] (bpf_jit_free) from [<803c73d0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85983f8c r4:8599f600 [<803c7290>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:85983f8c r4:8599f600 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:849ed400 r8:8599f62c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:8599f600 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8599f600 r8:80278fec r7:ea3bde60 r6:8599c680 r5:849ed400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea671fb0 to 0xea671ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:859dd700 INFO: task kworker/1:140:4605 is blocked on a mutex likely owned by task kworker/0:81:4602. task:kworker/0:81 state:R running task stack:0 pid:4602 tgid:4602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63614>] (__schedule) from [<81a649dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:849ec800 r8:80200c04 r7:ea641d54 r6:ffffffff r5:849ec800 r4:00000000 [<81a6499c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea641d20 to 0xea641d68) 1d20: 8c913000 ebecd000 00000001 80239bf8 7f047000 00000001 82acb1c4 82aca5a0 1d40: 7f047000 ebecd000 8280c9b4 ea641d9c ea641da0 ea641d70 80230af0 80239c10 1d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804e9d20>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9a9c>] (__purge_vmap_area_lazy) from [<804ea0d8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea641dc0 r5:ea641e08 r4:ea641dc0 [<804e9ef4>] (_vm_unmap_aliases) from [<804edd3c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9ef4>] (_vm_unmap_aliases) from [<804edd3c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8592da00 r4:00000000 [<804edbd0>] (vfree) from [<80558a28>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:849ec800 r7:00000000 r6:83018400 r5:00001000 r4:7f073000 [<805589f8>] (execmem_free) from [<803c5f48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea643000 [<803c5f38>] (bpf_jit_free_exec) from [<803c6328>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f38>] (bpf_jit_free_exec) from [<803c6328>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c62c0>] (bpf_jit_free) from [<803c73d0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85c1ab8c r4:8599ce00 [<803c7290>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:85c1ab8c r4:8599ce00 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:849ec800 r8:8599ce2c r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:8599ce00 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8599ce00 r8:80278fec r7:ea621e60 r6:8599ce80 r5:849ec800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea641fb0 to 0xea641ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:8595c7c0 INFO: task kworker/1:141:4607 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:141 state:D stack:0 pid:4607 tgid:4607 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63614>] (__schedule) from [<81a645a8>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a63614>] (__schedule) from [<81a645a8>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ea6b1d84 r9:00000002 r8:60000013 r7:829171a0 r6:ea6b1d8c r5:849f0000 r4:849f0000 [<81a6457c>] (schedule) from [<81a64990>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:849f0000 r4:8291719c [<81a64978>] (schedule_preempt_disabled) from [<81a67540>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64978>] (schedule_preempt_disabled) from [<81a67540>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a671f0>] (__mutex_lock.constprop.0) from [<81a67ce8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea6b1e08 r4:00000000 [<81a67cd4>] (__mutex_lock_slowpath) from [<81a67d28>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a67cec>] (mutex_lock) from [<804e9f5c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804e9ef4>] (_vm_unmap_aliases) from [<804edd3c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9ef4>] (_vm_unmap_aliases) from [<804edd3c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8595c240 r4:00000000 [<804edbd0>] (vfree) from [<80558a28>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:849f0000 r7:00000000 r6:83018600 r5:00001000 r4:7f079000 [<805589f8>] (execmem_free) from [<803c5f48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea6c9000 [<803c5f38>] (bpf_jit_free_exec) from [<803c6328>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f38>] (bpf_jit_free_exec) from [<803c6328>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c62c0>] (bpf_jit_free) from [<803c73d0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:8598278c r4:8599f680 [<803c7290>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:8598278c r4:8599f680 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:849f0000 r8:8599f6ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:8599f680 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8599f680 r8:80278fec r7:ea5b1e60 r6:85952080 r5:849f0000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea6b1fb0 to 0xea6b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:859ddf80 INFO: task kworker/1:141:4607 is blocked on a mutex likely owned by task kworker/0:81:4602. task:kworker/0:81 state:R running task stack:0 pid:4602 tgid:4602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63614>] (__schedule) from [<81a649dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:849ec800 r8:80200c04 r7:ea641d54 r6:ffffffff r5:849ec800 r4:00000000 [<81a6499c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea641d20 to 0xea641d68) 1d20: 8c913000 ebecd000 00000001 80239bf8 7f047000 00000001 82acb1c4 82aca5a0 1d40: 7f047000 ebecd000 8280c9b4 ea641d9c ea641da0 ea641d70 80230af0 80239c10 1d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804e9d20>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9a9c>] (__purge_vmap_area_lazy) from [<804ea0d8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea641dc0 r5:ea641e08 r4:ea641dc0 [<804e9ef4>] (_vm_unmap_aliases) from [<804edd3c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9ef4>] (_vm_unmap_aliases) from [<804edd3c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8592da00 r4:00000000 [<804edbd0>] (vfree) from [<80558a28>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:849ec800 r7:00000000 r6:83018400 r5:00001000 r4:7f073000 [<805589f8>] (execmem_free) from [<803c5f48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea643000 [<803c5f38>] (bpf_jit_free_exec) from [<803c6328>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f38>] (bpf_jit_free_exec) from [<803c6328>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c62c0>] (bpf_jit_free) from [<803c73d0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85c1ab8c r4:8599ce00 [<803c7290>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:85c1ab8c r4:8599ce00 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:849ec800 r8:8599ce2c r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:8599ce00 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8599ce00 r8:80278fec r7:ea621e60 r6:8599ce80 r5:849ec800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea641fb0 to 0xea641ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:8595c7c0 INFO: task kworker/1:142:4609 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:142 state:D stack:0 pid:4609 tgid:4609 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63614>] (__schedule) from [<81a645a8>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a63614>] (__schedule) from [<81a645a8>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ea3a9d84 r9:00000002 r8:60000113 r7:829171a0 r6:ea3a9d8c r5:859b3c00 r4:859b3c00 [<81a6457c>] (schedule) from [<81a64990>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:859b3c00 r4:8291719c [<81a64978>] (schedule_preempt_disabled) from [<81a67540>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64978>] (schedule_preempt_disabled) from [<81a67540>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a671f0>] (__mutex_lock.constprop.0) from [<81a67ce8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea3a9e08 r4:00000000 [<81a67cd4>] (__mutex_lock_slowpath) from [<81a67d28>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a67cec>] (mutex_lock) from [<804e9f5c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804e9ef4>] (_vm_unmap_aliases) from [<804edd3c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9ef4>] (_vm_unmap_aliases) from [<804edd3c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858caf00 r4:00000000 [<804edbd0>] (vfree) from [<80558a28>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:859b3c00 r7:00000000 r6:83018600 r5:00001000 r4:7f049000 [<805589f8>] (execmem_free) from [<803c5f48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dffc7000 [<803c5f38>] (bpf_jit_free_exec) from [<803c6328>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f38>] (bpf_jit_free_exec) from [<803c6328>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c62c0>] (bpf_jit_free) from [<803c73d0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:8598878c r4:8599f700 [<803c7290>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:8598878c r4:8599f700 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:859b3c00 r8:8599f72c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:8599f700 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8599f700 r8:80278fec r7:ea5b1e60 r6:8599f780 r5:859b3c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea3a9fb0 to 0xea3a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:8595c600 INFO: task kworker/1:142:4609 is blocked on a mutex likely owned by task kworker/0:81:4602. task:kworker/0:81 state:R running task stack:0 pid:4602 tgid:4602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63614>] (__schedule) from [<81a649dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:849ec800 r8:80200c04 r7:ea641d54 r6:ffffffff r5:849ec800 r4:00000000 [<81a6499c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea641d20 to 0xea641d68) 1d20: 8cbb7000 ebecd000 00000001 80239bf8 7f047000 00000001 82acb1c4 82aca5a0 1d40: 7f047000 ebecd000 8280c9b4 ea641d9c ea641da0 ea641d70 80230af0 80239c10 1d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804e9d20>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9a9c>] (__purge_vmap_area_lazy) from [<804ea0d8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea641dc0 r5:ea641e08 r4:ea641dc0 [<804e9ef4>] (_vm_unmap_aliases) from [<804edd3c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9ef4>] (_vm_unmap_aliases) from [<804edd3c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8592da00 r4:00000000 [<804edbd0>] (vfree) from [<80558a28>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:849ec800 r7:00000000 r6:83018400 r5:00001000 r4:7f073000 [<805589f8>] (execmem_free) from [<803c5f48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea643000 [<803c5f38>] (bpf_jit_free_exec) from [<803c6328>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f38>] (bpf_jit_free_exec) from [<803c6328>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c62c0>] (bpf_jit_free) from [<803c73d0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85c1ab8c r4:8599ce00 [<803c7290>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:85c1ab8c r4:8599ce00 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:849ec800 r8:8599ce2c r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:8599ce00 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8599ce00 r8:80278fec r7:ea621e60 r6:8599ce80 r5:849ec800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea641fb0 to 0xea641ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:8595c7c0 INFO: task kworker/1:143:4610 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:143 state:D stack:0 pid:4610 tgid:4610 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63614>] (__schedule) from [<81a645a8>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a63614>] (__schedule) from [<81a645a8>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ea3cdd84 r9:00000002 r8:60000113 r7:829171a0 r6:ea3cdd8c r5:859b3000 r4:859b3000 [<81a6457c>] (schedule) from [<81a64990>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:859b3000 r4:8291719c [<81a64978>] (schedule_preempt_disabled) from [<81a67540>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64978>] (schedule_preempt_disabled) from [<81a67540>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a671f0>] (__mutex_lock.constprop.0) from [<81a67ce8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea3cde08 r4:00000000 [<81a67cd4>] (__mutex_lock_slowpath) from [<81a67d28>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a67cec>] (mutex_lock) from [<804e9f5c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804e9ef4>] (_vm_unmap_aliases) from [<804edd3c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9ef4>] (_vm_unmap_aliases) from [<804edd3c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858cac00 r4:00000000 [<804edbd0>] (vfree) from [<80558a28>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:859b3000 r7:00000000 r6:83018600 r5:00001000 r4:7f047000 [<805589f8>] (execmem_free) from [<803c5f48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dff3b000 [<803c5f38>] (bpf_jit_free_exec) from [<803c6328>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f38>] (bpf_jit_free_exec) from [<803c6328>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c62c0>] (bpf_jit_free) from [<803c73d0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:8597338c r4:8599f800 [<803c7290>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:8597338c r4:8599f800 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:859b3000 r8:8599f82c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:8599f800 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8599f800 r8:80278fec r7:ea3a9e60 r6:8599f880 r5:859b3000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea3cdfb0 to 0xea3cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:858ca000 INFO: task kworker/1:143:4610 is blocked on a mutex likely owned by task kworker/0:81:4602. task:kworker/0:81 state:R running task stack:0 pid:4602 tgid:4602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63614>] (__schedule) from [<81a649dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:849ec800 r8:80200c04 r7:ea641d54 r6:ffffffff r5:849ec800 r4:00000000 [<81a6499c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea641d20 to 0xea641d68) 1d20: 8cf21000 ebecd000 00000001 80239bf8 7f047000 00000001 82acb1c4 82aca5a0 1d40: 7f047000 ebecd000 8280c9b4 ea641d9c ea641da0 ea641d70 80230af0 80239c10 1d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804e9d20>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9a9c>] (__purge_vmap_area_lazy) from [<804ea0d8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea641dc0 r5:ea641e08 r4:ea641dc0 [<804e9ef4>] (_vm_unmap_aliases) from [<804edd3c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9ef4>] (_vm_unmap_aliases) from [<804edd3c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8592da00 r4:00000000 [<804edbd0>] (vfree) from [<80558a28>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:849ec800 r7:00000000 r6:83018400 r5:00001000 r4:7f073000 [<805589f8>] (execmem_free) from [<803c5f48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea643000 [<803c5f38>] (bpf_jit_free_exec) from [<803c6328>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f38>] (bpf_jit_free_exec) from [<803c6328>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c62c0>] (bpf_jit_free) from [<803c73d0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85c1ab8c r4:8599ce00 [<803c7290>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:85c1ab8c r4:8599ce00 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:849ec800 r8:8599ce2c r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:8599ce00 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8599ce00 r8:80278fec r7:ea621e60 r6:8599ce80 r5:849ec800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea641fb0 to 0xea641ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:8595c7c0 INFO: task kworker/1:144:4614 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:144 state:D stack:0 pid:4614 tgid:4614 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63614>] (__schedule) from [<81a645a8>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a63614>] (__schedule) from [<81a645a8>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ea745d84 r9:00000002 r8:60000113 r7:829171a0 r6:ea745d8c r5:859b4800 r4:859b4800 [<81a6457c>] (schedule) from [<81a64990>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:859b4800 r4:8291719c [<81a64978>] (schedule_preempt_disabled) from [<81a67540>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64978>] (schedule_preempt_disabled) from [<81a67540>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a671f0>] (__mutex_lock.constprop.0) from [<81a67ce8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea745e08 r4:00000000 [<81a67cd4>] (__mutex_lock_slowpath) from [<81a67d28>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a67cec>] (mutex_lock) from [<804e9f5c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804e9ef4>] (_vm_unmap_aliases) from [<804edd3c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9ef4>] (_vm_unmap_aliases) from [<804edd3c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858ca2c0 r4:00000000 [<804edbd0>] (vfree) from [<80558a28>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:859b4800 r7:00000000 r6:83018600 r5:00001000 r4:7f04b000 [<805589f8>] (execmem_free) from [<803c5f48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:e0027000 [<803c5f38>] (bpf_jit_free_exec) from [<803c6328>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f38>] (bpf_jit_free_exec) from [<803c6328>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c62c0>] (bpf_jit_free) from [<803c73d0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85988b8c r4:8599fa00 [<803c7290>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:85988b8c r4:8599fa00 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:859b4800 r8:8599fa2c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:8599fa00 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8599fa00 r8:80278fec r7:ea3a9e60 r6:8599fa80 r5:859b4800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea745fb0 to 0xea745ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:858ca580 INFO: task kworker/1:144:4614 is blocked on a mutex likely owned by task kworker/0:81:4602. task:kworker/0:81 state:R running task stack:0 pid:4602 tgid:4602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63614>] (__schedule) from [<81a649dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:849ec800 r8:80200c04 r7:ea641d54 r6:ffffffff r5:849ec800 r4:00000000 [<81a6499c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea641d20 to 0xea641d68) 1d20: 8cf58000 ebecd000 00000001 80239bf8 7f047000 00000001 82acb1c4 82aca5a0 1d40: 7f047000 ebecd000 8280c9b4 ea641d9c ea641da0 ea641d70 80230af0 80239c10 1d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804e9d20>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9a9c>] (__purge_vmap_area_lazy) from [<804ea0d8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea641dc0 r5:ea641e08 r4:ea641dc0 [<804e9ef4>] (_vm_unmap_aliases) from [<804edd3c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9ef4>] (_vm_unmap_aliases) from [<804edd3c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8592da00 r4:00000000 [<804edbd0>] (vfree) from [<80558a28>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:849ec800 r7:00000000 r6:83018400 r5:00001000 r4:7f073000 [<805589f8>] (execmem_free) from [<803c5f48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea643000 [<803c5f38>] (bpf_jit_free_exec) from [<803c6328>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f38>] (bpf_jit_free_exec) from [<803c6328>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c62c0>] (bpf_jit_free) from [<803c73d0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85c1ab8c r4:8599ce00 [<803c7290>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:85c1ab8c r4:8599ce00 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:849ec800 r8:8599ce2c r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:8599ce00 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8599ce00 r8:80278fec r7:ea621e60 r6:8599ce80 r5:849ec800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea641fb0 to 0xea641ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:8595c7c0 INFO: task kworker/1:145:4617 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:145 state:D stack:0 pid:4617 tgid:4617 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63614>] (__schedule) from [<81a645a8>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a63614>] (__schedule) from [<81a645a8>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ea761d84 r9:00000002 r8:60000013 r7:829171a0 r6:ea761d8c r5:859b6000 r4:859b6000 [<81a6457c>] (schedule) from [<81a64990>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:859b6000 r4:8291719c [<81a64978>] (schedule_preempt_disabled) from [<81a67540>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64978>] (schedule_preempt_disabled) from [<81a67540>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a671f0>] (__mutex_lock.constprop.0) from [<81a67ce8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea761e08 r4:00000000 [<81a67cd4>] (__mutex_lock_slowpath) from [<81a67d28>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a67cec>] (mutex_lock) from [<804e9f5c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804e9ef4>] (_vm_unmap_aliases) from [<804edd3c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9ef4>] (_vm_unmap_aliases) from [<804edd3c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858cde40 r4:00000000 [<804edbd0>] (vfree) from [<80558a28>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:859b6000 r7:00000000 r6:83018600 r5:00001000 r4:7f04f000 [<805589f8>] (execmem_free) from [<803c5f48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:e818d000 [<803c5f38>] (bpf_jit_free_exec) from [<803c6328>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f38>] (bpf_jit_free_exec) from [<803c6328>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c62c0>] (bpf_jit_free) from [<803c73d0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85989f8c r4:8599fb80 [<803c7290>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:85989f8c r4:8599fb80 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:859b6000 r8:8599fbac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:8599fb80 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8599fb80 r8:80278fec r7:ea745e60 r6:8599fc00 r5:859b6000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea761fb0 to 0xea761ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:858cad80 INFO: task kworker/1:145:4617 is blocked on a mutex likely owned by task kworker/0:81:4602. task:kworker/0:81 state:R running task stack:0 pid:4602 tgid:4602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63614>] (__schedule) from [<81a649dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:849ec800 r8:80200c04 r7:ea641d54 r6:ffffffff r5:849ec800 r4:00000000 [<81a6499c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea641d20 to 0xea641d68) 1d20: 8cf58000 ebecd000 00000001 80239bf8 7f047000 00000001 82acb1c4 82aca5a0 1d40: 7f047000 ebecd000 8280c9b4 ea641d9c ea641da0 ea641d70 80230af0 80239c10 1d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804e9d20>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9a9c>] (__purge_vmap_area_lazy) from [<804ea0d8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea641dc0 r5:ea641e08 r4:ea641dc0 [<804e9ef4>] (_vm_unmap_aliases) from [<804edd3c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9ef4>] (_vm_unmap_aliases) from [<804edd3c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8592da00 r4:00000000 [<804edbd0>] (vfree) from [<80558a28>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:849ec800 r7:00000000 r6:83018400 r5:00001000 r4:7f073000 [<805589f8>] (execmem_free) from [<803c5f48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea643000 [<803c5f38>] (bpf_jit_free_exec) from [<803c6328>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f38>] (bpf_jit_free_exec) from [<803c6328>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c62c0>] (bpf_jit_free) from [<803c73d0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85c1ab8c r4:8599ce00 [<803c7290>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:85c1ab8c r4:8599ce00 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:849ec800 r8:8599ce2c r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:8599ce00 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8599ce00 r8:80278fec r7:ea621e60 r6:8599ce80 r5:849ec800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea641fb0 to 0xea641ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:8595c7c0 INFO: task kworker/1:146:4619 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:146 state:D stack:0 pid:4619 tgid:4619 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63614>] (__schedule) from [<81a645a8>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a63614>] (__schedule) from [<81a645a8>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ea40dd84 r9:00000002 r8:60000113 r7:829171a0 r6:ea40dd8c r5:859b6c00 r4:859b6c00 [<81a6457c>] (schedule) from [<81a64990>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:859b6c00 r4:8291719c [<81a64978>] (schedule_preempt_disabled) from [<81a67540>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64978>] (schedule_preempt_disabled) from [<81a67540>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a671f0>] (__mutex_lock.constprop.0) from [<81a67ce8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea40de08 r4:00000000 [<81a67cd4>] (__mutex_lock_slowpath) from [<81a67d28>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a67cec>] (mutex_lock) from [<804e9f5c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804e9ef4>] (_vm_unmap_aliases) from [<804edd3c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9ef4>] (_vm_unmap_aliases) from [<804edd3c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8595bbc0 r4:00000000 [<804edbd0>] (vfree) from [<80558a28>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:859b6c00 r7:00000000 r6:83018600 r5:00001000 r4:7f04d000 [<805589f8>] (execmem_free) from [<803c5f48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:e00cb000 [<803c5f38>] (bpf_jit_free_exec) from [<803c6328>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f38>] (bpf_jit_free_exec) from [<803c6328>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c62c0>] (bpf_jit_free) from [<803c73d0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85989b8c r4:8599fc80 [<803c7290>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:85989b8c r4:8599fc80 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:859b6c00 r8:8599fcac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:8599fc80 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8599fc80 r8:80278fec r7:ea761e60 r6:8599fd00 r5:859b6c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea40dfb0 to 0xea40dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:858caec0 INFO: task kworker/1:146:4619 is blocked on a mutex likely owned by task kworker/0:81:4602. task:kworker/0:81 state:R running task stack:0 pid:4602 tgid:4602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63614>] (__schedule) from [<81a649dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:849ec800 r8:80200c04 r7:ea641d54 r6:ffffffff r5:849ec800 r4:00000000 [<81a6499c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea641d20 to 0xea641d68) 1d20: 8d34d000 ebecd000 00000001 80239bf8 7f047000 00000001 82acb1c4 82aca5a0 1d40: 7f047000 ebecd000 8280c9b4 ea641d9c ea641da0 ea641d70 80230af0 80239c10 1d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804e9d20>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9a9c>] (__purge_vmap_area_lazy) from [<804ea0d8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea641dc0 r5:ea641e08 r4:ea641dc0 [<804e9ef4>] (_vm_unmap_aliases) from [<804edd3c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9ef4>] (_vm_unmap_aliases) from [<804edd3c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8592da00 r4:00000000 [<804edbd0>] (vfree) from [<80558a28>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:849ec800 r7:00000000 r6:83018400 r5:00001000 r4:7f073000 [<805589f8>] (execmem_free) from [<803c5f48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea643000 [<803c5f38>] (bpf_jit_free_exec) from [<803c6328>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f38>] (bpf_jit_free_exec) from [<803c6328>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c62c0>] (bpf_jit_free) from [<803c73d0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85c1ab8c r4:8599ce00 [<803c7290>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:85c1ab8c r4:8599ce00 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:849ec800 r8:8599ce2c r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:8599ce00 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8599ce00 r8:80278fec r7:ea621e60 r6:8599ce80 r5:849ec800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea641fb0 to 0xea641ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:8595c7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:148:4623 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:148 state:D stack:0 pid:4623 tgid:4623 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63614>] (__schedule) from [<81a645a8>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a63614>] (__schedule) from [<81a645a8>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ea769d84 r9:00000002 r8:60000113 r7:829171a0 r6:ea769d8c r5:859b0c00 r4:859b0c00 [<81a6457c>] (schedule) from [<81a64990>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:859b0c00 r4:8291719c [<81a64978>] (schedule_preempt_disabled) from [<81a67540>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64978>] (schedule_preempt_disabled) from [<81a67540>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a671f0>] (__mutex_lock.constprop.0) from [<81a67ce8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea769e08 r4:00000000 [<81a67cd4>] (__mutex_lock_slowpath) from [<81a67d28>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a67cec>] (mutex_lock) from [<804e9f5c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804e9ef4>] (_vm_unmap_aliases) from [<804edd3c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9ef4>] (_vm_unmap_aliases) from [<804edd3c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8592d980 r4:00000000 [<804edbd0>] (vfree) from [<80558a28>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:859b0c00 r7:00000000 r6:83018600 r5:00001000 r4:7f051000 [<805589f8>] (execmem_free) from [<803c5f48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea243000 [<803c5f38>] (bpf_jit_free_exec) from [<803c6328>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f38>] (bpf_jit_free_exec) from [<803c6328>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c62c0>] (bpf_jit_free) from [<803c73d0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:8598b38c r4:8599fe80 [<803c7290>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:8598b38c r4:8599fe80 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:859b0c00 r8:8599feac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:8599fe80 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8599fe80 r8:80278fec r7:ea765e60 r6:8599ff00 r5:859b0c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea769fb0 to 0xea769ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:858ca5c0 INFO: task kworker/1:148:4623 is blocked on a mutex likely owned by task kworker/0:81:4602. task:kworker/0:81 state:R running task stack:0 pid:4602 tgid:4602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63614>] (__schedule) from [<81a649dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:849ec800 r8:80200c04 r7:ea641d54 r6:ffffffff r5:849ec800 r4:00000000 [<81a6499c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea641d20 to 0xea641d68) 1d20: 8d655000 ebecd000 00000001 80239bf8 7f047000 00000001 82acb1c4 82aca5a0 1d40: 7f047000 ebecd000 8280c9b4 ea641d9c ea641da0 ea641d70 80230af0 80239c10 1d60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804e9d20>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9a9c>] (__purge_vmap_area_lazy) from [<804ea0d8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea641dc0 r5:ea641e08 r4:ea641dc0 [<804e9ef4>] (_vm_unmap_aliases) from [<804edd3c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9ef4>] (_vm_unmap_aliases) from [<804edd3c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8592da00 r4:00000000 [<804edbd0>] (vfree) from [<80558a28>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:849ec800 r7:00000000 r6:83018400 r5:00001000 r4:7f073000 [<805589f8>] (execmem_free) from [<803c5f48>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea643000 [<803c5f38>] (bpf_jit_free_exec) from [<803c6328>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f38>] (bpf_jit_free_exec) from [<803c6328>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c62c0>] (bpf_jit_free) from [<803c73d0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85c1ab8c r4:8599ce00 [<803c7290>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:85c1ab8c r4:8599ce00 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:849ec800 r8:8599ce2c r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:8599ce00 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8599ce00 r8:80278fec r7:ea621e60 r6:8599ce80 r5:849ec800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea641fb0 to 0xea641ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:8595c7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 30 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT Hardware name: ARM-Versatile Express Call trace: [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c arch/arm/kernel/traps.c:257) r7:00000000 r6:000e0013 r5:600e0093 r4:82252544 [<80201b08>] (show_stack) from [<8021f8b0>] (__dump_stack lib/dump_stack.c:94 [inline]) [<80201b08>] (show_stack) from [<8021f8b0>] (dump_stack_lvl+0x70/0x7c lib/dump_stack.c:120) [<8021f840>] (dump_stack_lvl) from [<8021f8d4>] (dump_stack+0x18/0x1c lib/dump_stack.c:129) r5:00000000 r4:00000001 [<8021f8bc>] (dump_stack) from [<81a4d22c>] (nmi_cpu_backtrace+0x160/0x17c lib/nmi_backtrace.c:113) [<81a4d0cc>] (nmi_cpu_backtrace) from [<81a4d378>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8 lib/nmi_backtrace.c:62) r7:00000000 r6:8280c690 r5:8281ae34 r4:ffffffff [<81a4d248>] (nmi_trigger_cpumask_backtrace) from [<802304fc>] (arch_trigger_cpumask_backtrace+0x18/0x1c arch/arm/kernel/smp.c:852) r9:8281ba28 r8:8280c810 r7:00020dea r6:00007bd6 r5:82abf7d4 r4:86048e0c [<802304e4>] (arch_trigger_cpumask_backtrace) from [<8037fab0>] (trigger_all_cpu_backtrace include/linux/nmi.h:160 [inline]) [<802304e4>] (arch_trigger_cpumask_backtrace) from [<8037fab0>] (check_hung_uninterruptible_tasks kernel/hung_task.c:332 [inline]) [<802304e4>] (arch_trigger_cpumask_backtrace) from [<8037fab0>] (watchdog+0x5d0/0x850 kernel/hung_task.c:495) [<8037f4e0>] (watchdog) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:00000000 r8:8037f4e0 r7:832a1a80 r6:832a1a80 r5:832f0c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf8d9fb0 to 0xdf8d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:8333d580 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 2818 Comm: pr/ttyAMA-1 Not tainted syzkaller #0 PREEMPT Hardware name: ARM-Versatile Express PC is at __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:152 [inline] PC is at _raw_spin_unlock_irqrestore+0x28/0x54 kernel/locking/spinlock.c:194 LR is at spin_unlock_irqrestore include/linux/spinlock.h:406 [inline] LR is at __uart_port_unlock_irqrestore include/linux/serial_core.h:616 [inline] LR is at pl011_console_device_unlock+0x20/0x24 drivers/tty/serial/amba-pl011.c:2603 pc : [<81a6d47c>] lr : [<80a8f070>] psr: 60000013 sp : eae65eb0 ip : eae65ec0 fp : eae65ebc r10: 82959554 r9 : 00000001 r8 : 00000000 r7 : 00000117 r6 : 829594b8 r5 : 00000000 r4 : 00000001 r3 : 00000837 r2 : 00000000 r1 : 60000013 r0 : 840bc840 Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none Control: 30c5387d Table: 8550c900 DAC: 00000000 Call trace: [<81a6d454>] (_raw_spin_unlock_irqrestore) from [<80a8f070>] (spin_unlock_irqrestore include/linux/spinlock.h:406 [inline]) [<81a6d454>] (_raw_spin_unlock_irqrestore) from [<80a8f070>] (__uart_port_unlock_irqrestore include/linux/serial_core.h:616 [inline]) [<81a6d454>] (_raw_spin_unlock_irqrestore) from [<80a8f070>] (pl011_console_device_unlock+0x20/0x24 drivers/tty/serial/amba-pl011.c:2603) [<80a8f050>] (pl011_console_device_unlock) from [<802e3768>] (nbcon_emit_one+0x88/0x100 kernel/printk/nbcon.c:1142) [<802e36e0>] (nbcon_emit_one) from [<802e3988>] (nbcon_kthread_func+0x1a8/0x2a4 kernel/printk/nbcon.c:1229) r6:8280c690 r5:841f6c00 r4:829594b8 [<802e37e0>] (nbcon_kthread_func) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:829594b8 r8:802e37e0 r7:84801180 r6:84801180 r5:841f6c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae65fb0 to 0xeae65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:8473aa00