INFO: task kworker/1:27:4149 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:27 state:D stack:0 pid:4149 tgid:4149 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81aea82c>] (__schedule) from [<81aebc40>] (__schedule_loop kernel/sched/core.c:6993 [inline]) [<81aea82c>] (__schedule) from [<81aebc40>] (schedule+0x2c/0x134 kernel/sched/core.c:7008) r10:e00edda4 r9:00000002 r8:60000113 r7:e00eddac r6:82918014 r5:85041880 r4:85041880 [<81aebc14>] (schedule) from [<81aebdcc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7065) r5:85041880 r4:82918010 [<81aebdb4>] (schedule_preempt_disabled) from [<81aeed14>] (__mutex_lock_common kernel/locking/mutex.c:692 [inline]) [<81aebdb4>] (schedule_preempt_disabled) from [<81aeed14>] (__mutex_lock.constprop.0+0x480/0x9cc kernel/locking/mutex.c:776) [<81aee894>] (__mutex_lock.constprop.0) from [<81aef334>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1065) r10:8280c82c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00ede28 r4:00000000 [<81aef320>] (__mutex_lock_slowpath) from [<81aef374>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:290) [<81aef338>] (mutex_lock) from [<804fd9cc>] (_vm_unmap_aliases+0x5c/0x238 mm/vmalloc.c:2957) [<804fd970>] (_vm_unmap_aliases) from [<805017c4>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fd970>] (_vm_unmap_aliases) from [<805017c4>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302ae05 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e02f00 r4:00000000 [<80501658>] (vfree) from [<8056f950>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:85041880 r8:01800000 r7:00000000 r6:8302ae00 r5:00001000 r4:7f049000 [<8056f920>] (execmem_free) from [<803cf290>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:dfcbb000 [<803cf280>] (bpf_jit_free_exec) from [<803cf670>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803cf280>] (bpf_jit_free_exec) from [<803cf670>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf60c>] (bpf_jit_free) from [<803d0684>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2968) r5:86024b94 r4:86024b94 [<803d053c>] (bpf_prog_free_deferred) from [<802766b8>] (process_one_work+0x1c8/0x59c kernel/workqueue.c:3276) r7:ddde4d80 r6:8302ae00 r5:86024b94 r4:85a7fe80 [<802764f0>] (process_one_work) from [<80277478>] (process_scheduled_works kernel/workqueue.c:3359 [inline]) [<802764f0>] (process_one_work) from [<80277478>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3440) r10:ddde4d80 r9:85a7feb0 r8:85041880 r7:82804d80 r6:ddde4da0 r5:ddde4d80 r4:85a7fe80 [<8027730c>] (worker_thread) from [<802814a4>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:dfcc5e88 r8:85a8d900 r7:85a7fe80 r6:8027730c r5:85041880 r4:85c63200 [<80281388>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00edfb0 to 0xe00edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281388 r4:85c63200 INFO: task kworker/1:27:4149 is blocked on a mutex likely owned by task kworker/0:250:4958. task:kworker/0:250 state:R running task stack:0 pid:4958 tgid:4958 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81aea82c>] (__schedule) from [<81aec078>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7238) r10:8280c880 r9:86086e40 r8:80200c04 r7:ea99dd7c r6:ffffffff r5:86086e40 r4:00000000 [<81aec038>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea99dd48 to 0xea99dd90) dd40: da333000 eaf19000 00000000 802387d0 82ad3620 82ad4264 dd60: 7f047000 eaf19000 00000000 00000001 8280c880 ea99ddbc eaf19000 ea99dd98 dd80: 8022f700 802387e8 80000013 ffffffff r5:80000013 r4:802387e8 [<8022f6a0>] (flush_tlb_kernel_range) from [<804fd77c>] (__purge_vmap_area_lazy+0x298/0x48c mm/vmalloc.c:2382) [<804fd4e4>] (__purge_vmap_area_lazy) from [<804fdb58>] (_vm_unmap_aliases+0x1e8/0x238 mm/vmalloc.c:2996) r10:00000000 r9:ea99dde0 r8:00000000 r7:ffffffff r6:00000008 r5:ea99de28 r4:ea99dde0 [<804fd970>] (_vm_unmap_aliases) from [<805017c4>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fd970>] (_vm_unmap_aliases) from [<805017c4>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302b005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e884c0 r4:00000000 [<80501658>] (vfree) from [<8056f950>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:86086e40 r8:00800000 r7:00000000 r6:8302b000 r5:00001000 r4:7f051000 [<8056f920>] (execmem_free) from [<803cf290>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:e014b000 [<803cf280>] (bpf_jit_free_exec) from [<803cf670>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803cf280>] (bpf_jit_free_exec) from [<803cf670>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf60c>] (bpf_jit_free) from [<803d0684>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2968) r5:860a0b94 r4:860a0b94 [<803d053c>] (bpf_prog_free_deferred) from [<802766b8>] (process_one_work+0x1c8/0x59c kernel/workqueue.c:3276) r7:dddd0d80 r6:8302b000 r5:860a0b94 r4:85e2b280 [<802764f0>] (process_one_work) from [<80277478>] (process_scheduled_works kernel/workqueue.c:3359 [inline]) [<802764f0>] (process_one_work) from [<80277478>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3440) r10:dddd0d80 r9:85e2b2b0 r8:86086e40 r7:82804d80 r6:dddd0da0 r5:dddd0d80 r4:85e2b280 [<8027730c>] (worker_thread) from [<802814a4>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:ea96de88 r8:85e2b200 r7:85e2b280 r6:8027730c r5:86086e40 r4:85e202c0 [<80281388>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea99dfb0 to 0xea99dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281388 r4:85e202c0 INFO: task kworker/1:32:4159 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:32 state:D stack:0 pid:4159 tgid:4159 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81aea82c>] (__schedule) from [<81aebc40>] (__schedule_loop kernel/sched/core.c:6993 [inline]) [<81aea82c>] (__schedule) from [<81aebc40>] (schedule+0x2c/0x134 kernel/sched/core.c:7008) r10:dfda1da4 r9:00000002 r8:60000013 r7:dfda1dac r6:82918014 r5:839d0c40 r4:839d0c40 [<81aebc14>] (schedule) from [<81aebdcc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7065) r5:839d0c40 r4:82918010 [<81aebdb4>] (schedule_preempt_disabled) from [<81aeed14>] (__mutex_lock_common kernel/locking/mutex.c:692 [inline]) [<81aebdb4>] (schedule_preempt_disabled) from [<81aeed14>] (__mutex_lock.constprop.0+0x480/0x9cc kernel/locking/mutex.c:776) [<81aee894>] (__mutex_lock.constprop.0) from [<81aef334>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1065) r10:8280c82c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfda1e28 r4:00000000 [<81aef320>] (__mutex_lock_slowpath) from [<81aef374>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:290) [<81aef338>] (mutex_lock) from [<804fd9cc>] (_vm_unmap_aliases+0x5c/0x238 mm/vmalloc.c:2957) [<804fd970>] (_vm_unmap_aliases) from [<805017c4>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fd970>] (_vm_unmap_aliases) from [<805017c4>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302ae05 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86055600 r4:00000000 [<80501658>] (vfree) from [<8056f950>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:839d0c40 r8:01800000 r7:00000000 r6:8302ae00 r5:00001000 r4:7f047000 [<8056f920>] (execmem_free) from [<803cf290>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:dfb49000 [<803cf280>] (bpf_jit_free_exec) from [<803cf670>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803cf280>] (bpf_jit_free_exec) from [<803cf670>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf60c>] (bpf_jit_free) from [<803d0684>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2968) r5:85d75b94 r4:85d75b94 [<803d053c>] (bpf_prog_free_deferred) from [<802766b8>] (process_one_work+0x1c8/0x59c kernel/workqueue.c:3276) r7:ddde4d80 r6:8302ae00 r5:85d75b94 r4:85ba9a80 [<802764f0>] (process_one_work) from [<80277478>] (process_scheduled_works kernel/workqueue.c:3359 [inline]) [<802764f0>] (process_one_work) from [<80277478>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3440) r10:ddde4d80 r9:85ba9ab0 r8:839d0c40 r7:82804d80 r6:ddde4da0 r5:ddde4d80 r4:85ba9a80 [<8027730c>] (worker_thread) from [<802814a4>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:e00ede88 r8:85d19380 r7:85ba9a80 r6:8027730c r5:839d0c40 r4:85d12000 [<80281388>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfda1fb0 to 0xdfda1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281388 r4:85d12000 INFO: task kworker/1:32:4159 is blocked on a mutex likely owned by task kworker/0:250:4958. task:kworker/0:250 state:R running task stack:0 pid:4958 tgid:4958 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81aea82c>] (__schedule) from [<81aec078>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7238) r10:8280c880 r9:86086e40 r8:80200c04 r7:ea99dd7c r6:ffffffff r5:86086e40 r4:00000000 [<81aec038>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea99dd48 to 0xea99dd90) dd40: daa89000 eaf19000 00000000 802387d0 82ad3620 82ad4264 dd60: 7f047000 eaf19000 00000000 00000001 8280c880 ea99ddbc eaf19000 ea99dd98 dd80: 8022f700 802387e8 80000013 ffffffff r5:80000013 r4:802387e8 [<8022f6a0>] (flush_tlb_kernel_range) from [<804fd77c>] (__purge_vmap_area_lazy+0x298/0x48c mm/vmalloc.c:2382) [<804fd4e4>] (__purge_vmap_area_lazy) from [<804fdb58>] (_vm_unmap_aliases+0x1e8/0x238 mm/vmalloc.c:2996) r10:00000000 r9:ea99dde0 r8:00000000 r7:ffffffff r6:00000008 r5:ea99de28 r4:ea99dde0 [<804fd970>] (_vm_unmap_aliases) from [<805017c4>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fd970>] (_vm_unmap_aliases) from [<805017c4>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302b005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e884c0 r4:00000000 [<80501658>] (vfree) from [<8056f950>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:86086e40 r8:00800000 r7:00000000 r6:8302b000 r5:00001000 r4:7f051000 [<8056f920>] (execmem_free) from [<803cf290>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:e014b000 [<803cf280>] (bpf_jit_free_exec) from [<803cf670>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803cf280>] (bpf_jit_free_exec) from [<803cf670>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf60c>] (bpf_jit_free) from [<803d0684>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2968) r5:860a0b94 r4:860a0b94 [<803d053c>] (bpf_prog_free_deferred) from [<802766b8>] (process_one_work+0x1c8/0x59c kernel/workqueue.c:3276) r7:dddd0d80 r6:8302b000 r5:860a0b94 r4:85e2b280 [<802764f0>] (process_one_work) from [<80277478>] (process_scheduled_works kernel/workqueue.c:3359 [inline]) [<802764f0>] (process_one_work) from [<80277478>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3440) r10:dddd0d80 r9:85e2b2b0 r8:86086e40 r7:82804d80 r6:dddd0da0 r5:dddd0d80 r4:85e2b280 [<8027730c>] (worker_thread) from [<802814a4>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:ea96de88 r8:85e2b200 r7:85e2b280 r6:8027730c r5:86086e40 r4:85e202c0 [<80281388>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea99dfb0 to 0xea99dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281388 r4:85e202c0 INFO: task kworker/1:35:4166 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:35 state:D stack:0 pid:4166 tgid:4166 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81aea82c>] (__schedule) from [<81aebc40>] (__schedule_loop kernel/sched/core.c:6993 [inline]) [<81aea82c>] (__schedule) from [<81aebc40>] (schedule+0x2c/0x134 kernel/sched/core.c:7008) r10:dfb5dda4 r9:00000002 r8:60000113 r7:dfb5ddac r6:82918014 r5:831fb100 r4:831fb100 [<81aebc14>] (schedule) from [<81aebdcc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7065) r5:831fb100 r4:82918010 [<81aebdb4>] (schedule_preempt_disabled) from [<81aeed14>] (__mutex_lock_common kernel/locking/mutex.c:692 [inline]) [<81aebdb4>] (schedule_preempt_disabled) from [<81aeed14>] (__mutex_lock.constprop.0+0x480/0x9cc kernel/locking/mutex.c:776) [<81aee894>] (__mutex_lock.constprop.0) from [<81aef334>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1065) r10:8280c82c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb5de28 r4:00000000 [<81aef320>] (__mutex_lock_slowpath) from [<81aef374>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:290) [<81aef338>] (mutex_lock) from [<804fd9cc>] (_vm_unmap_aliases+0x5c/0x238 mm/vmalloc.c:2957) [<804fd970>] (_vm_unmap_aliases) from [<805017c4>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fd970>] (_vm_unmap_aliases) from [<805017c4>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302ae05 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e20a80 r4:00000000 [<80501658>] (vfree) from [<8056f950>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:831fb100 r8:01800000 r7:00000000 r6:8302ae00 r5:00001000 r4:7f047000 [<8056f920>] (execmem_free) from [<803cf290>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:dfaa3000 [<803cf280>] (bpf_jit_free_exec) from [<803cf670>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803cf280>] (bpf_jit_free_exec) from [<803cf670>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf60c>] (bpf_jit_free) from [<803d0684>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2968) r5:85d78b94 r4:85d78b94 [<803d053c>] (bpf_prog_free_deferred) from [<802766b8>] (process_one_work+0x1c8/0x59c kernel/workqueue.c:3276) r7:ddde4d80 r6:8302ae00 r5:85d78b94 r4:85ba9280 [<802764f0>] (process_one_work) from [<80277478>] (process_scheduled_works kernel/workqueue.c:3359 [inline]) [<802764f0>] (process_one_work) from [<80277478>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3440) r10:ddde4d80 r9:85ba92b0 r8:831fb100 r7:82804d80 r6:ddde4da0 r5:ddde4d80 r4:85ba9280 [<8027730c>] (worker_thread) from [<802814a4>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:dfda1e88 r8:85ba9300 r7:85ba9280 r6:8027730c r5:831fb100 r4:84e31500 [<80281388>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb5dfb0 to 0xdfb5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281388 r4:84e31500 INFO: task kworker/1:35:4166 is blocked on a mutex likely owned by task kworker/0:250:4958. task:kworker/0:250 state:R running task stack:0 pid:4958 tgid:4958 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81aea82c>] (__schedule) from [<81aec078>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7238) r10:8280c880 r9:86086e40 r8:80200c04 r7:ea99dd7c r6:ffffffff r5:86086e40 r4:00000000 [<81aec038>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea99dd48 to 0xea99dd90) dd40: daa89000 eaf19000 00000000 802387d0 82ad3620 82ad4264 dd60: 7f047000 eaf19000 00000000 00000001 8280c880 ea99ddbc eaf19000 ea99dd98 dd80: 8022f700 802387e8 80000013 ffffffff r5:80000013 r4:802387e8 [<8022f6a0>] (flush_tlb_kernel_range) from [<804fd77c>] (__purge_vmap_area_lazy+0x298/0x48c mm/vmalloc.c:2382) [<804fd4e4>] (__purge_vmap_area_lazy) from [<804fdb58>] (_vm_unmap_aliases+0x1e8/0x238 mm/vmalloc.c:2996) r10:00000000 r9:ea99dde0 r8:00000000 r7:ffffffff r6:00000008 r5:ea99de28 r4:ea99dde0 [<804fd970>] (_vm_unmap_aliases) from [<805017c4>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fd970>] (_vm_unmap_aliases) from [<805017c4>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302b005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e884c0 r4:00000000 [<80501658>] (vfree) from [<8056f950>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:86086e40 r8:00800000 r7:00000000 r6:8302b000 r5:00001000 r4:7f051000 [<8056f920>] (execmem_free) from [<803cf290>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:e014b000 [<803cf280>] (bpf_jit_free_exec) from [<803cf670>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803cf280>] (bpf_jit_free_exec) from [<803cf670>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf60c>] (bpf_jit_free) from [<803d0684>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2968) r5:860a0b94 r4:860a0b94 [<803d053c>] (bpf_prog_free_deferred) from [<802766b8>] (process_one_work+0x1c8/0x59c kernel/workqueue.c:3276) r7:dddd0d80 r6:8302b000 r5:860a0b94 r4:85e2b280 [<802764f0>] (process_one_work) from [<80277478>] (process_scheduled_works kernel/workqueue.c:3359 [inline]) [<802764f0>] (process_one_work) from [<80277478>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3440) r10:dddd0d80 r9:85e2b2b0 r8:86086e40 r7:82804d80 r6:dddd0da0 r5:dddd0d80 r4:85e2b280 [<8027730c>] (worker_thread) from [<802814a4>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:ea96de88 r8:85e2b200 r7:85e2b280 r6:8027730c r5:86086e40 r4:85e202c0 [<80281388>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea99dfb0 to 0xea99dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281388 r4:85e202c0 INFO: task kworker/1:38:4172 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:38 state:D stack:0 pid:4172 tgid:4172 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81aea82c>] (__schedule) from [<81aebc40>] (__schedule_loop kernel/sched/core.c:6993 [inline]) [<81aea82c>] (__schedule) from [<81aebc40>] (schedule+0x2c/0x134 kernel/sched/core.c:7008) r10:dfbfdda4 r9:00000002 r8:60000113 r7:dfbfddac r6:82918014 r5:84fb8c40 r4:84fb8c40 [<81aebc14>] (schedule) from [<81aebdcc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7065) r5:84fb8c40 r4:82918010 [<81aebdb4>] (schedule_preempt_disabled) from [<81aeed14>] (__mutex_lock_common kernel/locking/mutex.c:692 [inline]) [<81aebdb4>] (schedule_preempt_disabled) from [<81aeed14>] (__mutex_lock.constprop.0+0x480/0x9cc kernel/locking/mutex.c:776) [<81aee894>] (__mutex_lock.constprop.0) from [<81aef334>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1065) r10:8280c82c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbfde28 r4:00000000 [<81aef320>] (__mutex_lock_slowpath) from [<81aef374>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:290) [<81aef338>] (mutex_lock) from [<804fd9cc>] (_vm_unmap_aliases+0x5c/0x238 mm/vmalloc.c:2957) [<804fd970>] (_vm_unmap_aliases) from [<805017c4>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fd970>] (_vm_unmap_aliases) from [<805017c4>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302ae05 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:860551c0 r4:00000000 [<80501658>] (vfree) from [<8056f950>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:84fb8c40 r8:01800000 r7:00000000 r6:8302ae00 r5:00001000 r4:7f04d000 [<8056f920>] (execmem_free) from [<803cf290>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:ea631000 [<803cf280>] (bpf_jit_free_exec) from [<803cf670>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803cf280>] (bpf_jit_free_exec) from [<803cf670>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf60c>] (bpf_jit_free) from [<803d0684>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2968) r5:85fcab94 r4:85fcab94 [<803d053c>] (bpf_prog_free_deferred) from [<802766b8>] (process_one_work+0x1c8/0x59c kernel/workqueue.c:3276) r7:ddde4d80 r6:8302ae00 r5:85fcab94 r4:84dfdf00 [<802764f0>] (process_one_work) from [<80277478>] (process_scheduled_works kernel/workqueue.c:3359 [inline]) [<802764f0>] (process_one_work) from [<80277478>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3440) r10:ddde4d80 r9:84dfdf30 r8:84fb8c40 r7:82804d80 r6:ddde4da0 r5:ddde4d80 r4:84dfdf00 [<8027730c>] (worker_thread) from [<802814a4>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:dfda1e88 r8:85c4d000 r7:84dfdf00 r6:8027730c r5:84fb8c40 r4:85dd8300 [<80281388>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbfdfb0 to 0xdfbfdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281388 r4:85dd8300 INFO: task kworker/1:38:4172 is blocked on a mutex likely owned by task kworker/0:250:4958. task:kworker/0:250 state:R running task stack:0 pid:4958 tgid:4958 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81aea82c>] (__schedule) from [<81aec078>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7238) r10:8280c880 r9:86086e40 r8:80200c04 r7:ea99dd7c r6:ffffffff r5:86086e40 r4:00000000 [<81aec038>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea99dd48 to 0xea99dd90) dd40: daa89000 eaf19000 00000000 802387d0 82ad3620 82ad4264 dd60: 7f047000 eaf19000 00000000 00000001 8280c880 ea99ddbc eaf19000 ea99dd98 dd80: 8022f700 802387e8 80000013 ffffffff r5:80000013 r4:802387e8 [<8022f6a0>] (flush_tlb_kernel_range) from [<804fd77c>] (__purge_vmap_area_lazy+0x298/0x48c mm/vmalloc.c:2382) [<804fd4e4>] (__purge_vmap_area_lazy) from [<804fdb58>] (_vm_unmap_aliases+0x1e8/0x238 mm/vmalloc.c:2996) r10:00000000 r9:ea99dde0 r8:00000000 r7:ffffffff r6:00000008 r5:ea99de28 r4:ea99dde0 [<804fd970>] (_vm_unmap_aliases) from [<805017c4>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fd970>] (_vm_unmap_aliases) from [<805017c4>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302b005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e884c0 r4:00000000 [<80501658>] (vfree) from [<8056f950>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:86086e40 r8:00800000 r7:00000000 r6:8302b000 r5:00001000 r4:7f051000 [<8056f920>] (execmem_free) from [<803cf290>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:e014b000 [<803cf280>] (bpf_jit_free_exec) from [<803cf670>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803cf280>] (bpf_jit_free_exec) from [<803cf670>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf60c>] (bpf_jit_free) from [<803d0684>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2968) r5:860a0b94 r4:860a0b94 [<803d053c>] (bpf_prog_free_deferred) from [<802766b8>] (process_one_work+0x1c8/0x59c kernel/workqueue.c:3276) r7:dddd0d80 r6:8302b000 r5:860a0b94 r4:85e2b280 [<802764f0>] (process_one_work) from [<80277478>] (process_scheduled_works kernel/workqueue.c:3359 [inline]) [<802764f0>] (process_one_work) from [<80277478>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3440) r10:dddd0d80 r9:85e2b2b0 r8:86086e40 r7:82804d80 r6:dddd0da0 r5:dddd0d80 r4:85e2b280 [<8027730c>] (worker_thread) from [<802814a4>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:ea96de88 r8:85e2b200 r7:85e2b280 r6:8027730c r5:86086e40 r4:85e202c0 [<80281388>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea99dfb0 to 0xea99dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281388 r4:85e202c0 INFO: task kworker/1:40:4175 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:40 state:D stack:0 pid:4175 tgid:4175 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81aea82c>] (__schedule) from [<81aebc40>] (__schedule_loop kernel/sched/core.c:6993 [inline]) [<81aea82c>] (__schedule) from [<81aebc40>] (schedule+0x2c/0x134 kernel/sched/core.c:7008) r10:dfc21da4 r9:00000002 r8:60000013 r7:dfc21dac r6:82918014 r5:83fb3d40 r4:83fb3d40 [<81aebc14>] (schedule) from [<81aebdcc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7065) r5:83fb3d40 r4:82918010 [<81aebdb4>] (schedule_preempt_disabled) from [<81aeed14>] (__mutex_lock_common kernel/locking/mutex.c:692 [inline]) [<81aebdb4>] (schedule_preempt_disabled) from [<81aeed14>] (__mutex_lock.constprop.0+0x480/0x9cc kernel/locking/mutex.c:776) [<81aee894>] (__mutex_lock.constprop.0) from [<81aef334>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1065) r10:8280c82c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc21e28 r4:00000000 [<81aef320>] (__mutex_lock_slowpath) from [<81aef374>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:290) [<81aef338>] (mutex_lock) from [<804fd9cc>] (_vm_unmap_aliases+0x5c/0x238 mm/vmalloc.c:2957) [<804fd970>] (_vm_unmap_aliases) from [<805017c4>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fd970>] (_vm_unmap_aliases) from [<805017c4>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302ae05 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e02e80 r4:00000000 [<80501658>] (vfree) from [<8056f950>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83fb3d40 r8:01800000 r7:00000000 r6:8302ae00 r5:00001000 r4:7f04b000 [<8056f920>] (execmem_free) from [<803cf290>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:e02e5000 [<803cf280>] (bpf_jit_free_exec) from [<803cf670>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803cf280>] (bpf_jit_free_exec) from [<803cf670>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf60c>] (bpf_jit_free) from [<803d0684>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2968) r5:86021394 r4:86021394 [<803d053c>] (bpf_prog_free_deferred) from [<802766b8>] (process_one_work+0x1c8/0x59c kernel/workqueue.c:3276) r7:ddde4d80 r6:8302ae00 r5:86021394 r4:85d02b80 [<802764f0>] (process_one_work) from [<80277478>] (process_scheduled_works kernel/workqueue.c:3359 [inline]) [<802764f0>] (process_one_work) from [<80277478>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3440) r10:00000000 r9:85d02bb0 r8:83fb3d40 r7:82804d80 r6:ddde4da0 r5:ddde4d80 r4:85d02b80 [<8027730c>] (worker_thread) from [<802814a4>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:dfbfde88 r8:84dfd580 r7:85d02b80 r6:8027730c r5:83fb3d40 r4:84da3dc0 [<80281388>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc21fb0 to 0xdfc21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281388 r4:84da3dc0 INFO: task kworker/1:40:4175 is blocked on a mutex likely owned by task kworker/0:250:4958. task:kworker/0:250 state:R running task stack:0 pid:4958 tgid:4958 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81aea82c>] (__schedule) from [<81aec078>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7238) r10:8280c880 r9:86086e40 r8:80200c04 r7:ea99dd7c r6:ffffffff r5:86086e40 r4:00000000 [<81aec038>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea99dd48 to 0xea99dd90) dd40: daa89000 eaf19000 00000000 802387d0 82ad3620 82ad4264 dd60: 7f047000 eaf19000 00000000 00000001 8280c880 ea99ddbc eaf19000 ea99dd98 dd80: 8022f700 802387e8 80000013 ffffffff r5:80000013 r4:802387e8 [<8022f6a0>] (flush_tlb_kernel_range) from [<804fd77c>] (__purge_vmap_area_lazy+0x298/0x48c mm/vmalloc.c:2382) [<804fd4e4>] (__purge_vmap_area_lazy) from [<804fdb58>] (_vm_unmap_aliases+0x1e8/0x238 mm/vmalloc.c:2996) r10:00000000 r9:ea99dde0 r8:00000000 r7:ffffffff r6:00000008 r5:ea99de28 r4:ea99dde0 [<804fd970>] (_vm_unmap_aliases) from [<805017c4>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fd970>] (_vm_unmap_aliases) from [<805017c4>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302b005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e884c0 r4:00000000 [<80501658>] (vfree) from [<8056f950>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:86086e40 r8:00800000 r7:00000000 r6:8302b000 r5:00001000 r4:7f051000 [<8056f920>] (execmem_free) from [<803cf290>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:e014b000 [<803cf280>] (bpf_jit_free_exec) from [<803cf670>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803cf280>] (bpf_jit_free_exec) from [<803cf670>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf60c>] (bpf_jit_free) from [<803d0684>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2968) r5:860a0b94 r4:860a0b94 [<803d053c>] (bpf_prog_free_deferred) from [<802766b8>] (process_one_work+0x1c8/0x59c kernel/workqueue.c:3276) r7:dddd0d80 r6:8302b000 r5:860a0b94 r4:85e2b280 [<802764f0>] (process_one_work) from [<80277478>] (process_scheduled_works kernel/workqueue.c:3359 [inline]) [<802764f0>] (process_one_work) from [<80277478>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3440) r10:dddd0d80 r9:85e2b2b0 r8:86086e40 r7:82804d80 r6:dddd0da0 r5:dddd0d80 r4:85e2b280 [<8027730c>] (worker_thread) from [<802814a4>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:ea96de88 r8:85e2b200 r7:85e2b280 r6:8027730c r5:86086e40 r4:85e202c0 [<80281388>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea99dfb0 to 0xea99dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281388 r4:85e202c0 INFO: task kworker/0:255:4970 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:255 state:D stack:0 pid:4970 tgid:4970 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81aea82c>] (__schedule) from [<81aebc40>] (__schedule_loop kernel/sched/core.c:6993 [inline]) [<81aea82c>] (__schedule) from [<81aebc40>] (schedule+0x2c/0x134 kernel/sched/core.c:7008) r10:eaa7dda4 r9:00000002 r8:60000113 r7:eaa7ddac r6:82918014 r5:85ec6200 r4:85ec6200 [<81aebc14>] (schedule) from [<81aebdcc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7065) r5:85ec6200 r4:82918010 [<81aebdb4>] (schedule_preempt_disabled) from [<81aeed14>] (__mutex_lock_common kernel/locking/mutex.c:692 [inline]) [<81aebdb4>] (schedule_preempt_disabled) from [<81aeed14>] (__mutex_lock.constprop.0+0x480/0x9cc kernel/locking/mutex.c:776) [<81aee894>] (__mutex_lock.constprop.0) from [<81aef334>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1065) r10:8280c82c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa7de28 r4:00000000 [<81aef320>] (__mutex_lock_slowpath) from [<81aef374>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:290) [<81aef338>] (mutex_lock) from [<804fd9cc>] (_vm_unmap_aliases+0x5c/0x238 mm/vmalloc.c:2957) [<804fd970>] (_vm_unmap_aliases) from [<805017c4>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fd970>] (_vm_unmap_aliases) from [<805017c4>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302b005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86055e00 r4:00000000 [<80501658>] (vfree) from [<8056f950>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:85ec6200 r8:00800000 r7:00000000 r6:8302b000 r5:00001000 r4:7f059000 [<8056f920>] (execmem_free) from [<803cf290>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:eaab7000 [<803cf280>] (bpf_jit_free_exec) from [<803cf670>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803cf280>] (bpf_jit_free_exec) from [<803cf670>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf60c>] (bpf_jit_free) from [<803d0684>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2968) r5:86027b94 r4:86027b94 [<803d053c>] (bpf_prog_free_deferred) from [<802766b8>] (process_one_work+0x1c8/0x59c kernel/workqueue.c:3276) r7:dddd0d80 r6:8302b000 r5:86027b94 r4:84e33f00 [<802764f0>] (process_one_work) from [<80277478>] (process_scheduled_works kernel/workqueue.c:3359 [inline]) [<802764f0>] (process_one_work) from [<80277478>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3440) r10:dddd0d80 r9:84e33f30 r8:85ec6200 r7:82804d80 r6:dddd0da0 r5:dddd0d80 r4:84e33f00 [<8027730c>] (worker_thread) from [<802814a4>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:ea99de88 r8:85e1ed80 r7:84e33f00 r6:8027730c r5:85ec6200 r4:84e2be00 [<80281388>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa7dfb0 to 0xeaa7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281388 r4:84e2be00 INFO: task kworker/0:255:4970 is blocked on a mutex likely owned by task kworker/0:250:4958. task:kworker/0:250 state:R running task stack:0 pid:4958 tgid:4958 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81aea82c>] (__schedule) from [<81aec078>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7238) r10:8280c880 r9:86086e40 r8:80200c04 r7:ea99dd7c r6:ffffffff r5:86086e40 r4:00000000 [<81aec038>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea99dd48 to 0xea99dd90) dd40: daa89000 eaf19000 00000000 802387d0 82ad3620 82ad4264 dd60: 7f047000 eaf19000 00000000 00000001 8280c880 ea99ddbc eaf19000 ea99dd98 dd80: 8022f700 802387e8 80000013 ffffffff r5:80000013 r4:802387e8 [<8022f6a0>] (flush_tlb_kernel_range) from [<804fd77c>] (__purge_vmap_area_lazy+0x298/0x48c mm/vmalloc.c:2382) [<804fd4e4>] (__purge_vmap_area_lazy) from [<804fdb58>] (_vm_unmap_aliases+0x1e8/0x238 mm/vmalloc.c:2996) r10:00000000 r9:ea99dde0 r8:00000000 r7:ffffffff r6:00000008 r5:ea99de28 r4:ea99dde0 [<804fd970>] (_vm_unmap_aliases) from [<805017c4>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fd970>] (_vm_unmap_aliases) from [<805017c4>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302b005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e884c0 r4:00000000 [<80501658>] (vfree) from [<8056f950>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:86086e40 r8:00800000 r7:00000000 r6:8302b000 r5:00001000 r4:7f051000 [<8056f920>] (execmem_free) from [<803cf290>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:e014b000 [<803cf280>] (bpf_jit_free_exec) from [<803cf670>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803cf280>] (bpf_jit_free_exec) from [<803cf670>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf60c>] (bpf_jit_free) from [<803d0684>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2968) r5:860a0b94 r4:860a0b94 [<803d053c>] (bpf_prog_free_deferred) from [<802766b8>] (process_one_work+0x1c8/0x59c kernel/workqueue.c:3276) r7:dddd0d80 r6:8302b000 r5:860a0b94 r4:85e2b280 [<802764f0>] (process_one_work) from [<80277478>] (process_scheduled_works kernel/workqueue.c:3359 [inline]) [<802764f0>] (process_one_work) from [<80277478>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3440) r10:dddd0d80 r9:85e2b2b0 r8:86086e40 r7:82804d80 r6:dddd0da0 r5:dddd0d80 r4:85e2b280 [<8027730c>] (worker_thread) from [<802814a4>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:ea96de88 r8:85e2b200 r7:85e2b280 r6:8027730c r5:86086e40 r4:85e202c0 [<80281388>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea99dfb0 to 0xea99dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281388 r4:85e202c0 INFO: task kworker/1:176:4972 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:176 state:D stack:0 pid:4972 tgid:4972 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81aea82c>] (__schedule) from [<81aebc40>] (__schedule_loop kernel/sched/core.c:6993 [inline]) [<81aea82c>] (__schedule) from [<81aebc40>] (schedule+0x2c/0x134 kernel/sched/core.c:7008) r10:ea9fdda4 r9:00000002 r8:60000113 r7:ea9fddac r6:82918014 r5:860855c0 r4:860855c0 [<81aebc14>] (schedule) from [<81aebdcc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7065) r5:860855c0 r4:82918010 [<81aebdb4>] (schedule_preempt_disabled) from [<81aeed14>] (__mutex_lock_common kernel/locking/mutex.c:692 [inline]) [<81aebdb4>] (schedule_preempt_disabled) from [<81aeed14>] (__mutex_lock.constprop.0+0x480/0x9cc kernel/locking/mutex.c:776) [<81aee894>] (__mutex_lock.constprop.0) from [<81aef334>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1065) r10:8280c82c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9fde28 r4:00000000 [<81aef320>] (__mutex_lock_slowpath) from [<81aef374>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:290) [<81aef338>] (mutex_lock) from [<804fd9cc>] (_vm_unmap_aliases+0x5c/0x238 mm/vmalloc.c:2957) [<804fd970>] (_vm_unmap_aliases) from [<805017c4>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fd970>] (_vm_unmap_aliases) from [<805017c4>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302ae05 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e2b0c0 r4:00000000 [<80501658>] (vfree) from [<8056f950>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:860855c0 r8:01800000 r7:00000000 r6:8302ae00 r5:00001000 r4:7f055000 [<8056f920>] (execmem_free) from [<803cf290>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:ea753000 [<803cf280>] (bpf_jit_free_exec) from [<803cf670>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803cf280>] (bpf_jit_free_exec) from [<803cf670>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf60c>] (bpf_jit_free) from [<803d0684>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2968) r5:860a1394 r4:860a1394 [<803d053c>] (bpf_prog_free_deferred) from [<802766b8>] (process_one_work+0x1c8/0x59c kernel/workqueue.c:3276) r7:ddde4d80 r6:8302ae00 r5:860a1394 r4:84e33f80 [<802764f0>] (process_one_work) from [<80277478>] (process_scheduled_works kernel/workqueue.c:3359 [inline]) [<802764f0>] (process_one_work) from [<80277478>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3440) r10:00000000 r9:84e33fb0 r8:860855c0 r7:82804d80 r6:ddde4da0 r5:ddde4d80 r4:84e33f80 [<8027730c>] (worker_thread) from [<802814a4>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:dfb5de88 r8:85e1ec80 r7:84e33f80 r6:8027730c r5:860855c0 r4:84e2b480 [<80281388>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9fdfb0 to 0xea9fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281388 r4:84e2b480 INFO: task kworker/1:176:4972 is blocked on a mutex likely owned by task kworker/0:250:4958. task:kworker/0:250 state:R running task stack:0 pid:4958 tgid:4958 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81aea82c>] (__schedule) from [<81aec078>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7238) r10:8280c880 r9:86086e40 r8:80200c04 r7:ea99dd7c r6:ffffffff r5:86086e40 r4:00000000 [<81aec038>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea99dd48 to 0xea99dd90) dd40: daa89000 eaf19000 00000000 802387d0 82ad3620 82ad4264 dd60: 7f047000 eaf19000 00000000 00000001 8280c880 ea99ddbc eaf19000 ea99dd98 dd80: 8022f700 802387e8 80000013 ffffffff r5:80000013 r4:802387e8 [<8022f6a0>] (flush_tlb_kernel_range) from [<804fd77c>] (__purge_vmap_area_lazy+0x298/0x48c mm/vmalloc.c:2382) [<804fd4e4>] (__purge_vmap_area_lazy) from [<804fdb58>] (_vm_unmap_aliases+0x1e8/0x238 mm/vmalloc.c:2996) r10:00000000 r9:ea99dde0 r8:00000000 r7:ffffffff r6:00000008 r5:ea99de28 r4:ea99dde0 [<804fd970>] (_vm_unmap_aliases) from [<805017c4>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fd970>] (_vm_unmap_aliases) from [<805017c4>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302b005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e884c0 r4:00000000 [<80501658>] (vfree) from [<8056f950>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:86086e40 r8:00800000 r7:00000000 r6:8302b000 r5:00001000 r4:7f051000 [<8056f920>] (execmem_free) from [<803cf290>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:e014b000 [<803cf280>] (bpf_jit_free_exec) from [<803cf670>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803cf280>] (bpf_jit_free_exec) from [<803cf670>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf60c>] (bpf_jit_free) from [<803d0684>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2968) r5:860a0b94 r4:860a0b94 [<803d053c>] (bpf_prog_free_deferred) from [<802766b8>] (process_one_work+0x1c8/0x59c kernel/workqueue.c:3276) r7:dddd0d80 r6:8302b000 r5:860a0b94 r4:85e2b280 [<802764f0>] (process_one_work) from [<80277478>] (process_scheduled_works kernel/workqueue.c:3359 [inline]) [<802764f0>] (process_one_work) from [<80277478>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3440) r10:dddd0d80 r9:85e2b2b0 r8:86086e40 r7:82804d80 r6:dddd0da0 r5:dddd0d80 r4:85e2b280 [<8027730c>] (worker_thread) from [<802814a4>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:ea96de88 r8:85e2b200 r7:85e2b280 r6:8027730c r5:86086e40 r4:85e202c0 [<80281388>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea99dfb0 to 0xea99dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281388 r4:85e202c0 INFO: task kworker/0:256:4974 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:256 state:D stack:0 pid:4974 tgid:4974 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81aea82c>] (__schedule) from [<81aebc40>] (__schedule_loop kernel/sched/core.c:6993 [inline]) [<81aea82c>] (__schedule) from [<81aebc40>] (schedule+0x2c/0x134 kernel/sched/core.c:7008) r10:eaaa5da4 r9:00000002 r8:60000113 r7:eaaa5dac r6:82918014 r5:86084980 r4:86084980 [<81aebc14>] (schedule) from [<81aebdcc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7065) r5:86084980 r4:82918010 [<81aebdb4>] (schedule_preempt_disabled) from [<81aeed14>] (__mutex_lock_common kernel/locking/mutex.c:692 [inline]) [<81aebdb4>] (schedule_preempt_disabled) from [<81aeed14>] (__mutex_lock.constprop.0+0x480/0x9cc kernel/locking/mutex.c:776) [<81aee894>] (__mutex_lock.constprop.0) from [<81aef334>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1065) r10:8280c82c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaa5e28 r4:00000000 [<81aef320>] (__mutex_lock_slowpath) from [<81aef374>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:290) [<81aef338>] (mutex_lock) from [<804fd9cc>] (_vm_unmap_aliases+0x5c/0x238 mm/vmalloc.c:2957) [<804fd970>] (_vm_unmap_aliases) from [<805017c4>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fd970>] (_vm_unmap_aliases) from [<805017c4>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302b005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e348c0 r4:00000000 [<80501658>] (vfree) from [<8056f950>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:86084980 r8:00800000 r7:00000000 r6:8302b000 r5:00001000 r4:7f057000 [<8056f920>] (execmem_free) from [<803cf290>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:ea7eb000 [<803cf280>] (bpf_jit_free_exec) from [<803cf670>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803cf280>] (bpf_jit_free_exec) from [<803cf670>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf60c>] (bpf_jit_free) from [<803d0684>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2968) r5:860a2394 r4:860a2394 [<803d053c>] (bpf_prog_free_deferred) from [<802766b8>] (process_one_work+0x1c8/0x59c kernel/workqueue.c:3276) r7:dddd0d80 r6:8302b000 r5:860a2394 r4:84e33e00 [<802764f0>] (process_one_work) from [<80277478>] (process_scheduled_works kernel/workqueue.c:3359 [inline]) [<802764f0>] (process_one_work) from [<80277478>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3440) r10:dddd0d80 r9:84e33e30 r8:86084980 r7:82804d80 r6:dddd0da0 r5:dddd0d80 r4:84e33e00 [<8027730c>] (worker_thread) from [<802814a4>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:ea99de88 r8:84e33d00 r7:84e33e00 r6:8027730c r5:86084980 r4:84e45740 [<80281388>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaaa5fb0 to 0xeaaa5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281388 r4:84e45740 INFO: task kworker/0:256:4974 is blocked on a mutex likely owned by task kworker/0:250:4958. task:kworker/0:250 state:R running task stack:0 pid:4958 tgid:4958 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81aea82c>] (__schedule) from [<81aec078>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7238) r10:8280c880 r9:86086e40 r8:80200c04 r7:ea99dd7c r6:ffffffff r5:86086e40 r4:00000000 [<81aec038>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea99dd48 to 0xea99dd90) dd40: daa89000 eaf19000 00000000 802387d0 82ad3620 82ad4264 dd60: 7f047000 eaf19000 00000000 00000001 8280c880 ea99ddbc eaf19000 ea99dd98 dd80: 8022f700 802387e8 80000013 ffffffff r5:80000013 r4:802387e8 [<8022f6a0>] (flush_tlb_kernel_range) from [<804fd77c>] (__purge_vmap_area_lazy+0x298/0x48c mm/vmalloc.c:2382) [<804fd4e4>] (__purge_vmap_area_lazy) from [<804fdb58>] (_vm_unmap_aliases+0x1e8/0x238 mm/vmalloc.c:2996) r10:00000000 r9:ea99dde0 r8:00000000 r7:ffffffff r6:00000008 r5:ea99de28 r4:ea99dde0 [<804fd970>] (_vm_unmap_aliases) from [<805017c4>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fd970>] (_vm_unmap_aliases) from [<805017c4>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302b005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e884c0 r4:00000000 [<80501658>] (vfree) from [<8056f950>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:86086e40 r8:00800000 r7:00000000 r6:8302b000 r5:00001000 r4:7f051000 [<8056f920>] (execmem_free) from [<803cf290>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:e014b000 [<803cf280>] (bpf_jit_free_exec) from [<803cf670>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803cf280>] (bpf_jit_free_exec) from [<803cf670>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf60c>] (bpf_jit_free) from [<803d0684>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2968) r5:860a0b94 r4:860a0b94 [<803d053c>] (bpf_prog_free_deferred) from [<802766b8>] (process_one_work+0x1c8/0x59c kernel/workqueue.c:3276) r7:dddd0d80 r6:8302b000 r5:860a0b94 r4:85e2b280 [<802764f0>] (process_one_work) from [<80277478>] (process_scheduled_works kernel/workqueue.c:3359 [inline]) [<802764f0>] (process_one_work) from [<80277478>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3440) r10:dddd0d80 r9:85e2b2b0 r8:86086e40 r7:82804d80 r6:dddd0da0 r5:dddd0d80 r4:85e2b280 [<8027730c>] (worker_thread) from [<802814a4>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:ea96de88 r8:85e2b200 r7:85e2b280 r6:8027730c r5:86086e40 r4:85e202c0 [<80281388>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea99dfb0 to 0xea99dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281388 r4:85e202c0 INFO: task kworker/0:257:4977 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:257 state:D stack:0 pid:4977 tgid:4977 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81aea82c>] (__schedule) from [<81aebc40>] (__schedule_loop kernel/sched/core.c:6993 [inline]) [<81aea82c>] (__schedule) from [<81aebc40>] (schedule+0x2c/0x134 kernel/sched/core.c:7008) r10:eaaa9da4 r9:00000002 r8:60000013 r7:eaaa9dac r6:82918014 r5:86083d40 r4:86083d40 [<81aebc14>] (schedule) from [<81aebdcc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7065) r5:86083d40 r4:82918010 [<81aebdb4>] (schedule_preempt_disabled) from [<81aeed14>] (__mutex_lock_common kernel/locking/mutex.c:692 [inline]) [<81aebdb4>] (schedule_preempt_disabled) from [<81aeed14>] (__mutex_lock.constprop.0+0x480/0x9cc kernel/locking/mutex.c:776) [<81aee894>] (__mutex_lock.constprop.0) from [<81aef334>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1065) r10:8280c82c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaa9e28 r4:00000000 [<81aef320>] (__mutex_lock_slowpath) from [<81aef374>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:290) [<81aef338>] (mutex_lock) from [<804fd9cc>] (_vm_unmap_aliases+0x5c/0x238 mm/vmalloc.c:2957) [<804fd970>] (_vm_unmap_aliases) from [<805017c4>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fd970>] (_vm_unmap_aliases) from [<805017c4>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302b005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e88440 r4:00000000 [<80501658>] (vfree) from [<8056f950>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:86083d40 r8:00800000 r7:00000000 r6:8302b000 r5:00001000 r4:7f053000 [<8056f920>] (execmem_free) from [<803cf290>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:e43db000 [<803cf280>] (bpf_jit_free_exec) from [<803cf670>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803cf280>] (bpf_jit_free_exec) from [<803cf670>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf60c>] (bpf_jit_free) from [<803d0684>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2968) r5:860a0394 r4:860a0394 [<803d053c>] (bpf_prog_free_deferred) from [<802766b8>] (process_one_work+0x1c8/0x59c kernel/workqueue.c:3276) r7:dddd0d80 r6:8302b000 r5:860a0394 r4:85e1eb80 [<802764f0>] (process_one_work) from [<80277478>] (process_scheduled_works kernel/workqueue.c:3359 [inline]) [<802764f0>] (process_one_work) from [<80277478>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3440) r10:00000000 r9:85e1ebb0 r8:86083d40 r7:82804d80 r6:dddd0da0 r5:dddd0d80 r4:85e1eb80 [<8027730c>] (worker_thread) from [<802814a4>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:eaaa5e88 r8:86051700 r7:85e1eb80 r6:8027730c r5:86083d40 r4:85e200c0 [<80281388>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaaa9fb0 to 0xeaaa9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281388 r4:85e200c0 INFO: task kworker/0:257:4977 is blocked on a mutex likely owned by task kworker/0:250:4958. task:kworker/0:250 state:R running task stack:0 pid:4958 tgid:4958 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81aea82c>] (__schedule) from [<81aec078>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7238) r10:8280c880 r9:86086e40 r8:80200c04 r7:ea99dd7c r6:ffffffff r5:86086e40 r4:00000000 [<81aec038>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea99dd48 to 0xea99dd90) dd40: daa89000 eaf19000 00000000 802387d0 82ad3620 82ad4264 dd60: 7f047000 eaf19000 00000000 00000001 8280c880 ea99ddbc eaf19000 ea99dd98 dd80: 8022f700 802387e8 80000013 ffffffff r5:80000013 r4:802387e8 [<8022f6a0>] (flush_tlb_kernel_range) from [<804fd77c>] (__purge_vmap_area_lazy+0x298/0x48c mm/vmalloc.c:2382) [<804fd4e4>] (__purge_vmap_area_lazy) from [<804fdb58>] (_vm_unmap_aliases+0x1e8/0x238 mm/vmalloc.c:2996) r10:00000000 r9:ea99dde0 r8:00000000 r7:ffffffff r6:00000008 r5:ea99de28 r4:ea99dde0 [<804fd970>] (_vm_unmap_aliases) from [<805017c4>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fd970>] (_vm_unmap_aliases) from [<805017c4>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302b005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e884c0 r4:00000000 [<80501658>] (vfree) from [<8056f950>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:86086e40 r8:00800000 r7:00000000 r6:8302b000 r5:00001000 r4:7f051000 [<8056f920>] (execmem_free) from [<803cf290>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:e014b000 [<803cf280>] (bpf_jit_free_exec) from [<803cf670>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803cf280>] (bpf_jit_free_exec) from [<803cf670>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf60c>] (bpf_jit_free) from [<803d0684>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2968) r5:860a0b94 r4:860a0b94 [<803d053c>] (bpf_prog_free_deferred) from [<802766b8>] (process_one_work+0x1c8/0x59c kernel/workqueue.c:3276) r7:dddd0d80 r6:8302b000 r5:860a0b94 r4:85e2b280 [<802764f0>] (process_one_work) from [<80277478>] (process_scheduled_works kernel/workqueue.c:3359 [inline]) [<802764f0>] (process_one_work) from [<80277478>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3440) r10:dddd0d80 r9:85e2b2b0 r8:86086e40 r7:82804d80 r6:dddd0da0 r5:dddd0d80 r4:85e2b280 [<8027730c>] (worker_thread) from [<802814a4>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:ea96de88 r8:85e2b200 r7:85e2b280 r6:8027730c r5:86086e40 r4:85e202c0 [<80281388>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea99dfb0 to 0xea99dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281388 r4:85e202c0 INFO: task kworker/0:258:4980 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:258 state:D stack:0 pid:4980 tgid:4980 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81aea82c>] (__schedule) from [<81aebc40>] (__schedule_loop kernel/sched/core.c:6993 [inline]) [<81aea82c>] (__schedule) from [<81aebc40>] (schedule+0x2c/0x134 kernel/sched/core.c:7008) r10:eaaadda4 r9:00000002 r8:60000013 r7:eaaaddac r6:82918014 r5:86083100 r4:86083100 [<81aebc14>] (schedule) from [<81aebdcc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7065) r5:86083100 r4:82918010 [<81aebdb4>] (schedule_preempt_disabled) from [<81aeed14>] (__mutex_lock_common kernel/locking/mutex.c:692 [inline]) [<81aebdb4>] (schedule_preempt_disabled) from [<81aeed14>] (__mutex_lock.constprop.0+0x480/0x9cc kernel/locking/mutex.c:776) [<81aee894>] (__mutex_lock.constprop.0) from [<81aef334>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1065) r10:8280c82c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaade28 r4:00000000 [<81aef320>] (__mutex_lock_slowpath) from [<81aef374>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:290) [<81aef338>] (mutex_lock) from [<804fd9cc>] (_vm_unmap_aliases+0x5c/0x238 mm/vmalloc.c:2957) [<804fd970>] (_vm_unmap_aliases) from [<805017c4>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fd970>] (_vm_unmap_aliases) from [<805017c4>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302b005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86055a00 r4:00000000 [<80501658>] (vfree) from [<8056f950>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:86083100 r8:00800000 r7:00000000 r6:8302b000 r5:00001000 r4:7f04b000 [<8056f920>] (execmem_free) from [<803cf290>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:e01ef000 [<803cf280>] (bpf_jit_free_exec) from [<803cf670>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803cf280>] (bpf_jit_free_exec) from [<803cf670>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf60c>] (bpf_jit_free) from [<803d0684>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2968) r5:86027394 r4:86027394 [<803d053c>] (bpf_prog_free_deferred) from [<802766b8>] (process_one_work+0x1c8/0x59c kernel/workqueue.c:3276) r7:dddd0d80 r6:8302b000 r5:86027394 r4:86051600 [<802764f0>] (process_one_work) from [<80277478>] (process_scheduled_works kernel/workqueue.c:3359 [inline]) [<802764f0>] (process_one_work) from [<80277478>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3440) r10:dddd0d80 r9:86051630 r8:86083100 r7:82804d80 r6:dddd0da0 r5:dddd0d80 r4:86051600 [<8027730c>] (worker_thread) from [<802814a4>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:eaa7de88 r8:86051580 r7:86051600 r6:8027730c r5:86083100 r4:84e455c0 [<80281388>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaaadfb0 to 0xeaaadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281388 r4:84e455c0 INFO: task kworker/0:258:4980 is blocked on a mutex likely owned by task kworker/0:250:4958. task:kworker/0:250 state:R running task stack:0 pid:4958 tgid:4958 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81aea82c>] (__schedule) from [<81aec078>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7238) r10:8280c880 r9:86086e40 r8:80200c04 r7:ea99dd7c r6:ffffffff r5:86086e40 r4:00000000 [<81aec038>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea99dd48 to 0xea99dd90) dd40: daa89000 eaf19000 00000000 802387d0 82ad3620 82ad4264 dd60: 7f047000 eaf19000 00000000 00000001 8280c880 ea99ddbc eaf19000 ea99dd98 dd80: 8022f700 802387e8 80000013 ffffffff r5:80000013 r4:802387e8 [<8022f6a0>] (flush_tlb_kernel_range) from [<804fd77c>] (__purge_vmap_area_lazy+0x298/0x48c mm/vmalloc.c:2382) [<804fd4e4>] (__purge_vmap_area_lazy) from [<804fdb58>] (_vm_unmap_aliases+0x1e8/0x238 mm/vmalloc.c:2996) r10:00000000 r9:ea99dde0 r8:00000000 r7:ffffffff r6:00000008 r5:ea99de28 r4:ea99dde0 [<804fd970>] (_vm_unmap_aliases) from [<805017c4>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fd970>] (_vm_unmap_aliases) from [<805017c4>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302b005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e884c0 r4:00000000 [<80501658>] (vfree) from [<8056f950>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:86086e40 r8:00800000 r7:00000000 r6:8302b000 r5:00001000 r4:7f051000 [<8056f920>] (execmem_free) from [<803cf290>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:e014b000 [<803cf280>] (bpf_jit_free_exec) from [<803cf670>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803cf280>] (bpf_jit_free_exec) from [<803cf670>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf60c>] (bpf_jit_free) from [<803d0684>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2968) r5:860a0b94 r4:860a0b94 [<803d053c>] (bpf_prog_free_deferred) from [<802766b8>] (process_one_work+0x1c8/0x59c kernel/workqueue.c:3276) r7:dddd0d80 r6:8302b000 r5:860a0b94 r4:85e2b280 [<802764f0>] (process_one_work) from [<80277478>] (process_scheduled_works kernel/workqueue.c:3359 [inline]) [<802764f0>] (process_one_work) from [<80277478>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3440) r10:dddd0d80 r9:85e2b2b0 r8:86086e40 r7:82804d80 r6:dddd0da0 r5:dddd0d80 r4:85e2b280 [<8027730c>] (worker_thread) from [<802814a4>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:ea96de88 r8:85e2b200 r7:85e2b280 r6:8027730c r5:86086e40 r4:85e202c0 [<80281388>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea99dfb0 to 0xea99dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281388 r4:85e202c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:259:4981 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:259 state:D stack:0 pid:4981 tgid:4981 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81aea82c>] (__schedule) from [<81aebc40>] (__schedule_loop kernel/sched/core.c:6993 [inline]) [<81aea82c>] (__schedule) from [<81aebc40>] (schedule+0x2c/0x134 kernel/sched/core.c:7008) r10:eaab1da4 r9:00000002 r8:60000013 r7:eaab1dac r6:82918014 r5:860824c0 r4:860824c0 [<81aebc14>] (schedule) from [<81aebdcc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7065) r5:860824c0 r4:82918010 [<81aebdb4>] (schedule_preempt_disabled) from [<81aeed14>] (__mutex_lock_common kernel/locking/mutex.c:692 [inline]) [<81aebdb4>] (schedule_preempt_disabled) from [<81aeed14>] (__mutex_lock.constprop.0+0x480/0x9cc kernel/locking/mutex.c:776) [<81aee894>] (__mutex_lock.constprop.0) from [<81aef334>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1065) r10:8280c82c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaab1e28 r4:00000000 [<81aef320>] (__mutex_lock_slowpath) from [<81aef374>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:290) [<81aef338>] (mutex_lock) from [<804fd9cc>] (_vm_unmap_aliases+0x5c/0x238 mm/vmalloc.c:2957) [<804fd970>] (_vm_unmap_aliases) from [<805017c4>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fd970>] (_vm_unmap_aliases) from [<805017c4>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302b005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:860557c0 r4:00000000 [<80501658>] (vfree) from [<8056f950>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:860824c0 r8:00800000 r7:00000000 r6:8302b000 r5:00001000 r4:7f04f000 [<8056f920>] (execmem_free) from [<803cf290>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:ea6ad000 [<803cf280>] (bpf_jit_free_exec) from [<803cf670>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803cf280>] (bpf_jit_free_exec) from [<803cf670>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf60c>] (bpf_jit_free) from [<803d0684>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2968) r5:86026394 r4:86026394 [<803d053c>] (bpf_prog_free_deferred) from [<802766b8>] (process_one_work+0x1c8/0x59c kernel/workqueue.c:3276) r7:dddd0d80 r6:8302b000 r5:86026394 r4:86051480 [<802764f0>] (process_one_work) from [<80277478>] (process_scheduled_works kernel/workqueue.c:3359 [inline]) [<802764f0>] (process_one_work) from [<80277478>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3440) r10:dddd0d80 r9:860514b0 r8:860824c0 r7:82804d80 r6:dddd0da0 r5:dddd0d80 r4:86051480 [<8027730c>] (worker_thread) from [<802814a4>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:eaaade88 r8:86051400 r7:86051480 r6:8027730c r5:860824c0 r4:84e455c0 [<80281388>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaab1fb0 to 0xeaab1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281388 r4:84e455c0 INFO: task kworker/0:259:4981 is blocked on a mutex likely owned by task kworker/0:250:4958. task:kworker/0:250 state:R running task stack:0 pid:4958 tgid:4958 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81aea82c>] (__schedule) from [<81aec078>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7238) r10:8280c880 r9:86086e40 r8:80200c04 r7:ea99dd7c r6:ffffffff r5:86086e40 r4:00000000 [<81aec038>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea99dd48 to 0xea99dd90) dd40: daa89000 eaf19000 00000000 802387d0 82ad3620 82ad4264 dd60: 7f047000 eaf19000 00000000 00000001 8280c880 ea99ddbc eaf19000 ea99dd98 dd80: 8022f700 802387e8 80000013 ffffffff r5:80000013 r4:802387e8 [<8022f6a0>] (flush_tlb_kernel_range) from [<804fd77c>] (__purge_vmap_area_lazy+0x298/0x48c mm/vmalloc.c:2382) [<804fd4e4>] (__purge_vmap_area_lazy) from [<804fdb58>] (_vm_unmap_aliases+0x1e8/0x238 mm/vmalloc.c:2996) r10:00000000 r9:ea99dde0 r8:00000000 r7:ffffffff r6:00000008 r5:ea99de28 r4:ea99dde0 [<804fd970>] (_vm_unmap_aliases) from [<805017c4>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fd970>] (_vm_unmap_aliases) from [<805017c4>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302b005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e884c0 r4:00000000 [<80501658>] (vfree) from [<8056f950>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:86086e40 r8:00800000 r7:00000000 r6:8302b000 r5:00001000 r4:7f051000 [<8056f920>] (execmem_free) from [<803cf290>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:e014b000 [<803cf280>] (bpf_jit_free_exec) from [<803cf670>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803cf280>] (bpf_jit_free_exec) from [<803cf670>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf60c>] (bpf_jit_free) from [<803d0684>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2968) r5:860a0b94 r4:860a0b94 [<803d053c>] (bpf_prog_free_deferred) from [<802766b8>] (process_one_work+0x1c8/0x59c kernel/workqueue.c:3276) r7:dddd0d80 r6:8302b000 r5:860a0b94 r4:85e2b280 [<802764f0>] (process_one_work) from [<80277478>] (process_scheduled_works kernel/workqueue.c:3359 [inline]) [<802764f0>] (process_one_work) from [<80277478>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3440) r10:dddd0d80 r9:85e2b2b0 r8:86086e40 r7:82804d80 r6:dddd0da0 r5:dddd0d80 r4:85e2b280 [<8027730c>] (worker_thread) from [<802814a4>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:ea96de88 r8:85e2b200 r7:85e2b280 r6:8027730c r5:86086e40 r4:85e202c0 [<80281388>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea99dfb0 to 0xea99dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281388 r4:85e202c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:260:4985 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:260 state:D stack:0 pid:4985 tgid:4985 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81aea82c>] (__schedule) from [<81aebc40>] (__schedule_loop kernel/sched/core.c:6993 [inline]) [<81aea82c>] (__schedule) from [<81aebc40>] (schedule+0x2c/0x134 kernel/sched/core.c:7008) r10:ea9c1da4 r9:00000002 r8:60000113 r7:ea9c1dac r6:82918014 r5:86080000 r4:86080000 [<81aebc14>] (schedule) from [<81aebdcc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7065) r5:86080000 r4:82918010 [<81aebdb4>] (schedule_preempt_disabled) from [<81aeed14>] (__mutex_lock_common kernel/locking/mutex.c:692 [inline]) [<81aebdb4>] (schedule_preempt_disabled) from [<81aeed14>] (__mutex_lock.constprop.0+0x480/0x9cc kernel/locking/mutex.c:776) [<81aee894>] (__mutex_lock.constprop.0) from [<81aef334>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1065) r10:8280c82c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9c1e28 r4:00000000 [<81aef320>] (__mutex_lock_slowpath) from [<81aef374>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:290) [<81aef338>] (mutex_lock) from [<804fd9cc>] (_vm_unmap_aliases+0x5c/0x238 mm/vmalloc.c:2957) [<804fd970>] (_vm_unmap_aliases) from [<805017c4>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fd970>] (_vm_unmap_aliases) from [<805017c4>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302b005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86055b00 r4:00000000 [<80501658>] (vfree) from [<8056f950>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:86080000 r8:00800000 r7:00000000 r6:8302b000 r5:00001000 r4:7f049000 [<8056f920>] (execmem_free) from [<803cf290>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:dfc2b000 [<803cf280>] (bpf_jit_free_exec) from [<803cf670>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803cf280>] (bpf_jit_free_exec) from [<803cf670>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf60c>] (bpf_jit_free) from [<803d0684>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2968) r5:86026b94 r4:86026b94 [<803d053c>] (bpf_prog_free_deferred) from [<802766b8>] (process_one_work+0x1c8/0x59c kernel/workqueue.c:3276) r7:dddd0d80 r6:8302b000 r5:86026b94 r4:85e1eb00 [<802764f0>] (process_one_work) from [<80277478>] (process_scheduled_works kernel/workqueue.c:3359 [inline]) [<802764f0>] (process_one_work) from [<80277478>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3440) r10:00000000 r9:85e1eb30 r8:86080000 r7:82804d80 r6:dddd0da0 r5:dddd0d80 r4:85e1eb00 [<8027730c>] (worker_thread) from [<802814a4>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:eaaade88 r8:86051280 r7:85e1eb00 r6:8027730c r5:86080000 r4:84e36b00 [<80281388>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9c1fb0 to 0xea9c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281388 r4:84e36b00 INFO: task kworker/0:260:4985 is blocked on a mutex likely owned by task kworker/0:250:4958. task:kworker/0:250 state:R running task stack:0 pid:4958 tgid:4958 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81aea82c>] (__schedule) from [<81aec078>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7238) r10:8280c880 r9:86086e40 r8:80200c04 r7:ea99dd7c r6:ffffffff r5:86086e40 r4:00000000 [<81aec038>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea99dd48 to 0xea99dd90) dd40: dad29000 eaf19000 00000000 802387d0 82ad3620 82ad4264 dd60: 7f047000 eaf19000 00000000 00000001 8280c880 ea99ddbc eaf19000 ea99dd98 dd80: 8022f700 802387e8 80000013 ffffffff r5:80000013 r4:802387e8 [<8022f6a0>] (flush_tlb_kernel_range) from [<804fd77c>] (__purge_vmap_area_lazy+0x298/0x48c mm/vmalloc.c:2382) [<804fd4e4>] (__purge_vmap_area_lazy) from [<804fdb58>] (_vm_unmap_aliases+0x1e8/0x238 mm/vmalloc.c:2996) r10:00000000 r9:ea99dde0 r8:00000000 r7:ffffffff r6:00000008 r5:ea99de28 r4:ea99dde0 [<804fd970>] (_vm_unmap_aliases) from [<805017c4>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fd970>] (_vm_unmap_aliases) from [<805017c4>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302b005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e884c0 r4:00000000 [<80501658>] (vfree) from [<8056f950>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:86086e40 r8:00800000 r7:00000000 r6:8302b000 r5:00001000 r4:7f051000 [<8056f920>] (execmem_free) from [<803cf290>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:e014b000 [<803cf280>] (bpf_jit_free_exec) from [<803cf670>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803cf280>] (bpf_jit_free_exec) from [<803cf670>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf60c>] (bpf_jit_free) from [<803d0684>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2968) r5:860a0b94 r4:860a0b94 [<803d053c>] (bpf_prog_free_deferred) from [<802766b8>] (process_one_work+0x1c8/0x59c kernel/workqueue.c:3276) r7:dddd0d80 r6:8302b000 r5:860a0b94 r4:85e2b280 [<802764f0>] (process_one_work) from [<80277478>] (process_scheduled_works kernel/workqueue.c:3359 [inline]) [<802764f0>] (process_one_work) from [<80277478>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3440) r10:dddd0d80 r9:85e2b2b0 r8:86086e40 r7:82804d80 r6:dddd0da0 r5:dddd0d80 r4:85e2b280 [<8027730c>] (worker_thread) from [<802814a4>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:ea96de88 r8:85e2b200 r7:85e2b280 r6:8027730c r5:86086e40 r4:85e202c0 [<80281388>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea99dfb0 to 0xea99dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281388 r4:85e202c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:261:4988 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:261 state:D stack:0 pid:4988 tgid:4988 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81aea82c>] (__schedule) from [<81aebc40>] (__schedule_loop kernel/sched/core.c:6993 [inline]) [<81aea82c>] (__schedule) from [<81aebc40>] (schedule+0x2c/0x134 kernel/sched/core.c:7008) r10:eaaa1da4 r9:00000002 r8:60000113 r7:eaaa1dac r6:82918014 r5:86036e40 r4:86036e40 [<81aebc14>] (schedule) from [<81aebdcc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7065) r5:86036e40 r4:82918010 [<81aebdb4>] (schedule_preempt_disabled) from [<81aeed14>] (__mutex_lock_common kernel/locking/mutex.c:692 [inline]) [<81aebdb4>] (schedule_preempt_disabled) from [<81aeed14>] (__mutex_lock.constprop.0+0x480/0x9cc kernel/locking/mutex.c:776) [<81aee894>] (__mutex_lock.constprop.0) from [<81aef334>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1065) r10:8280c82c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaa1e28 r4:00000000 [<81aef320>] (__mutex_lock_slowpath) from [<81aef374>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:290) [<81aef338>] (mutex_lock) from [<804fd9cc>] (_vm_unmap_aliases+0x5c/0x238 mm/vmalloc.c:2957) [<804fd970>] (_vm_unmap_aliases) from [<805017c4>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fd970>] (_vm_unmap_aliases) from [<805017c4>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302b005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e2d0c0 r4:00000000 [<80501658>] (vfree) from [<8056f950>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:86036e40 r8:00800000 r7:00000000 r6:8302b000 r5:00001000 r4:7f04d000 [<8056f920>] (execmem_free) from [<803cf290>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:ea523000 [<803cf280>] (bpf_jit_free_exec) from [<803cf670>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803cf280>] (bpf_jit_free_exec) from [<803cf670>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf60c>] (bpf_jit_free) from [<803d0684>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2968) r5:86025b94 r4:86025b94 [<803d053c>] (bpf_prog_free_deferred) from [<802766b8>] (process_one_work+0x1c8/0x59c kernel/workqueue.c:3276) r7:dddd0d80 r6:8302b000 r5:86025b94 r4:86051000 [<802764f0>] (process_one_work) from [<80277478>] (process_scheduled_works kernel/workqueue.c:3359 [inline]) [<802764f0>] (process_one_work) from [<80277478>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3440) r10:dddd0d80 r9:86051030 r8:86036e40 r7:82804d80 r6:dddd0da0 r5:dddd0d80 r4:86051000 [<8027730c>] (worker_thread) from [<802814a4>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:eaab1e88 r8:86051100 r7:86051000 r6:8027730c r5:86036e40 r4:85e2d0c0 [<80281388>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaaa1fb0 to 0xeaaa1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281388 r4:85e2d0c0 INFO: task kworker/0:261:4988 is blocked on a mutex likely owned by task kworker/0:250:4958. task:kworker/0:250 state:R running task stack:0 pid:4958 tgid:4958 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81aea82c>] (__schedule) from [<81aec078>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7238) r10:8280c880 r9:86086e40 r8:80200c04 r7:ea99dd7c r6:ffffffff r5:86086e40 r4:00000000 [<81aec038>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea99dd48 to 0xea99dd90) dd40: dafc8000 eaf19000 00000000 802387d0 82ad3620 82ad4264 dd60: 7f047000 eaf19000 00000000 00000001 8280c880 ea99ddbc eaf19000 ea99dd98 dd80: 8022f700 802387e8 80000013 ffffffff r5:80000013 r4:802387e8 [<8022f6a0>] (flush_tlb_kernel_range) from [<804fd77c>] (__purge_vmap_area_lazy+0x298/0x48c mm/vmalloc.c:2382) [<804fd4e4>] (__purge_vmap_area_lazy) from [<804fdb58>] (_vm_unmap_aliases+0x1e8/0x238 mm/vmalloc.c:2996) r10:00000000 r9:ea99dde0 r8:00000000 r7:ffffffff r6:00000008 r5:ea99de28 r4:ea99dde0 [<804fd970>] (_vm_unmap_aliases) from [<805017c4>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fd970>] (_vm_unmap_aliases) from [<805017c4>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302b005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e884c0 r4:00000000 [<80501658>] (vfree) from [<8056f950>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:86086e40 r8:00800000 r7:00000000 r6:8302b000 r5:00001000 r4:7f051000 [<8056f920>] (execmem_free) from [<803cf290>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:e014b000 [<803cf280>] (bpf_jit_free_exec) from [<803cf670>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803cf280>] (bpf_jit_free_exec) from [<803cf670>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf60c>] (bpf_jit_free) from [<803d0684>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2968) r5:860a0b94 r4:860a0b94 [<803d053c>] (bpf_prog_free_deferred) from [<802766b8>] (process_one_work+0x1c8/0x59c kernel/workqueue.c:3276) r7:dddd0d80 r6:8302b000 r5:860a0b94 r4:85e2b280 [<802764f0>] (process_one_work) from [<80277478>] (process_scheduled_works kernel/workqueue.c:3359 [inline]) [<802764f0>] (process_one_work) from [<80277478>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3440) r10:dddd0d80 r9:85e2b2b0 r8:86086e40 r7:82804d80 r6:dddd0da0 r5:dddd0d80 r4:85e2b280 [<8027730c>] (worker_thread) from [<802814a4>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:ea96de88 r8:85e2b200 r7:85e2b280 r6:8027730c r5:86086e40 r4:85e202c0 [<80281388>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea99dfb0 to 0xea99dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281388 r4:85e202c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:262:4990 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:262 state:D stack:0 pid:4990 tgid:4990 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81aea82c>] (__schedule) from [<81aebc40>] (__schedule_loop kernel/sched/core.c:6993 [inline]) [<81aea82c>] (__schedule) from [<81aebc40>] (schedule+0x2c/0x134 kernel/sched/core.c:7008) r10:ea9d1da4 r9:00000002 r8:60000013 r7:ea9d1dac r6:82918014 r5:86034980 r4:86034980 [<81aebc14>] (schedule) from [<81aebdcc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7065) r5:86034980 r4:82918010 [<81aebdb4>] (schedule_preempt_disabled) from [<81aeed14>] (__mutex_lock_common kernel/locking/mutex.c:692 [inline]) [<81aebdb4>] (schedule_preempt_disabled) from [<81aeed14>] (__mutex_lock.constprop.0+0x480/0x9cc kernel/locking/mutex.c:776) [<81aee894>] (__mutex_lock.constprop.0) from [<81aef334>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1065) r10:8280c82c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9d1e28 r4:00000000 [<81aef320>] (__mutex_lock_slowpath) from [<81aef374>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:290) [<81aef338>] (mutex_lock) from [<804fd9cc>] (_vm_unmap_aliases+0x5c/0x238 mm/vmalloc.c:2957) [<804fd970>] (_vm_unmap_aliases) from [<805017c4>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fd970>] (_vm_unmap_aliases) from [<805017c4>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302b005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86043f00 r4:00000000 [<80501658>] (vfree) from [<8056f950>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:86034980 r8:00800000 r7:00000000 r6:8302b000 r5:00001000 r4:7f055000 [<8056f920>] (execmem_free) from [<803cf290>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:e840f000 [<803cf280>] (bpf_jit_free_exec) from [<803cf670>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803cf280>] (bpf_jit_free_exec) from [<803cf670>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf60c>] (bpf_jit_free) from [<803d0684>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2968) r5:86023394 r4:86023394 [<803d053c>] (bpf_prog_free_deferred) from [<802766b8>] (process_one_work+0x1c8/0x59c kernel/workqueue.c:3276) r7:dddd0d80 r6:8302b000 r5:86023394 r4:86050f00 [<802764f0>] (process_one_work) from [<80277478>] (process_scheduled_works kernel/workqueue.c:3359 [inline]) [<802764f0>] (process_one_work) from [<80277478>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3440) r10:dddd0d80 r9:86050f30 r8:86034980 r7:82804d80 r6:dddd0da0 r5:dddd0d80 r4:86050f00 [<8027730c>] (worker_thread) from [<802814a4>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:eaab1e88 r8:86050e80 r7:86050f00 r6:8027730c r5:86034980 r4:85e31240 [<80281388>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9d1fb0 to 0xea9d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281388 r4:85e31240 INFO: task kworker/0:262:4990 is blocked on a mutex likely owned by task kworker/0:250:4958. task:kworker/0:250 state:R running task stack:0 pid:4958 tgid:4958 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81aea82c>] (__schedule) from [<81aec078>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7238) r10:8280c880 r9:86086e40 r8:80200c04 r7:ea99dd7c r6:ffffffff r5:86086e40 r4:00000000 [<81aec038>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea99dd48 to 0xea99dd90) dd40: dba13000 eaf19000 00000000 802387d0 82ad3620 82ad4264 dd60: 7f047000 eaf19000 00000000 00000001 8280c880 ea99ddbc eaf19000 ea99dd98 dd80: 8022f700 802387e8 80000013 ffffffff r5:80000013 r4:802387e8 [<8022f6a0>] (flush_tlb_kernel_range) from [<804fd77c>] (__purge_vmap_area_lazy+0x298/0x48c mm/vmalloc.c:2382) [<804fd4e4>] (__purge_vmap_area_lazy) from [<804fdb58>] (_vm_unmap_aliases+0x1e8/0x238 mm/vmalloc.c:2996) r10:00000000 r9:ea99dde0 r8:00000000 r7:ffffffff r6:00000008 r5:ea99de28 r4:ea99dde0 [<804fd970>] (_vm_unmap_aliases) from [<805017c4>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fd970>] (_vm_unmap_aliases) from [<805017c4>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302b005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e884c0 r4:00000000 [<80501658>] (vfree) from [<8056f950>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:86086e40 r8:00800000 r7:00000000 r6:8302b000 r5:00001000 r4:7f051000 [<8056f920>] (execmem_free) from [<803cf290>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:e014b000 [<803cf280>] (bpf_jit_free_exec) from [<803cf670>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803cf280>] (bpf_jit_free_exec) from [<803cf670>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf60c>] (bpf_jit_free) from [<803d0684>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2968) r5:860a0b94 r4:860a0b94 [<803d053c>] (bpf_prog_free_deferred) from [<802766b8>] (process_one_work+0x1c8/0x59c kernel/workqueue.c:3276) r7:dddd0d80 r6:8302b000 r5:860a0b94 r4:85e2b280 [<802764f0>] (process_one_work) from [<80277478>] (process_scheduled_works kernel/workqueue.c:3359 [inline]) [<802764f0>] (process_one_work) from [<80277478>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3440) r10:dddd0d80 r9:85e2b2b0 r8:86086e40 r7:82804d80 r6:dddd0da0 r5:dddd0d80 r4:85e2b280 [<8027730c>] (worker_thread) from [<802814a4>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:ea96de88 r8:85e2b200 r7:85e2b280 r6:8027730c r5:86086e40 r4:85e202c0 [<80281388>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea99dfb0 to 0xea99dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281388 r4:85e202c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:263:4991 blocked for more than 431 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:263 state:D stack:0 pid:4991 tgid:4991 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81aea82c>] (__schedule) from [<81aebc40>] (__schedule_loop kernel/sched/core.c:6993 [inline]) [<81aea82c>] (__schedule) from [<81aebc40>] (schedule+0x2c/0x134 kernel/sched/core.c:7008) r10:eaab5da4 r9:00000002 r8:60000113 r7:eaab5dac r6:82918014 r5:860355c0 r4:860355c0 [<81aebc14>] (schedule) from [<81aebdcc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7065) r5:860355c0 r4:82918010 [<81aebdb4>] (schedule_preempt_disabled) from [<81aeed14>] (__mutex_lock_common kernel/locking/mutex.c:692 [inline]) [<81aebdb4>] (schedule_preempt_disabled) from [<81aeed14>] (__mutex_lock.constprop.0+0x480/0x9cc kernel/locking/mutex.c:776) [<81aee894>] (__mutex_lock.constprop.0) from [<81aef334>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1065) r10:8280c82c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaab5e28 r4:00000000 [<81aef320>] (__mutex_lock_slowpath) from [<81aef374>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:290) [<81aef338>] (mutex_lock) from [<804fd9cc>] (_vm_unmap_aliases+0x5c/0x238 mm/vmalloc.c:2957) [<804fd970>] (_vm_unmap_aliases) from [<805017c4>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fd970>] (_vm_unmap_aliases) from [<805017c4>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302b005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:860555c0 r4:00000000 [<80501658>] (vfree) from [<8056f950>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:860355c0 r8:00800000 r7:00000000 r6:8302b000 r5:00001000 r4:7f045000 [<8056f920>] (execmem_free) from [<803cf290>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:df995000 [<803cf280>] (bpf_jit_free_exec) from [<803cf670>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803cf280>] (bpf_jit_free_exec) from [<803cf670>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf60c>] (bpf_jit_free) from [<803d0684>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2968) r5:86025394 r4:86025394 [<803d053c>] (bpf_prog_free_deferred) from [<802766b8>] (process_one_work+0x1c8/0x59c kernel/workqueue.c:3276) r7:dddd0d80 r6:8302b000 r5:86025394 r4:86050d00 [<802764f0>] (process_one_work) from [<80277478>] (process_scheduled_works kernel/workqueue.c:3359 [inline]) [<802764f0>] (process_one_work) from [<80277478>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3440) r10:00000000 r9:86050d30 r8:860355c0 r7:82804d80 r6:dddd0da0 r5:dddd0d80 r4:86050d00 [<8027730c>] (worker_thread) from [<802814a4>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:ea9d1e88 r8:86050f80 r7:86050d00 r6:8027730c r5:860355c0 r4:85e24300 [<80281388>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaab5fb0 to 0xeaab5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281388 r4:85e24300 INFO: task kworker/0:263:4991 is blocked on a mutex likely owned by task kworker/0:250:4958. task:kworker/0:250 state:R running task stack:0 pid:4958 tgid:4958 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81aea82c>] (__schedule) from [<81aec078>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7238) r10:8280c880 r9:86086e40 r8:80200c04 r7:ea99dd7c r6:ffffffff r5:86086e40 r4:00000000 [<81aec038>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea99dd48 to 0xea99dd90) dd40: dba13000 eaf19000 00000000 802387d0 82ad3620 82ad4264 dd60: 7f047000 eaf19000 00000000 00000001 8280c880 ea99ddbc eaf19000 ea99dd98 dd80: 8022f700 802387e8 80000013 ffffffff r5:80000013 r4:802387e8 [<8022f6a0>] (flush_tlb_kernel_range) from [<804fd77c>] (__purge_vmap_area_lazy+0x298/0x48c mm/vmalloc.c:2382) [<804fd4e4>] (__purge_vmap_area_lazy) from [<804fdb58>] (_vm_unmap_aliases+0x1e8/0x238 mm/vmalloc.c:2996) r10:00000000 r9:ea99dde0 r8:00000000 r7:ffffffff r6:00000008 r5:ea99de28 r4:ea99dde0 [<804fd970>] (_vm_unmap_aliases) from [<805017c4>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fd970>] (_vm_unmap_aliases) from [<805017c4>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302b005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e884c0 r4:00000000 [<80501658>] (vfree) from [<8056f950>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:86086e40 r8:00800000 r7:00000000 r6:8302b000 r5:00001000 r4:7f051000 [<8056f920>] (execmem_free) from [<803cf290>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:e014b000 [<803cf280>] (bpf_jit_free_exec) from [<803cf670>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803cf280>] (bpf_jit_free_exec) from [<803cf670>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf60c>] (bpf_jit_free) from [<803d0684>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2968) r5:860a0b94 r4:860a0b94 [<803d053c>] (bpf_prog_free_deferred) from [<802766b8>] (process_one_work+0x1c8/0x59c kernel/workqueue.c:3276) r7:dddd0d80 r6:8302b000 r5:860a0b94 r4:85e2b280 [<802764f0>] (process_one_work) from [<80277478>] (process_scheduled_works kernel/workqueue.c:3359 [inline]) [<802764f0>] (process_one_work) from [<80277478>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3440) r10:dddd0d80 r9:85e2b2b0 r8:86086e40 r7:82804d80 r6:dddd0da0 r5:dddd0d80 r4:85e2b280 [<8027730c>] (worker_thread) from [<802814a4>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:ea96de88 r8:85e2b200 r7:85e2b280 r6:8027730c r5:86086e40 r4:85e202c0 [<80281388>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea99dfb0 to 0xea99dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281388 r4:85e202c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:264:4994 blocked for more than 431 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:264 state:D stack:0 pid:4994 tgid:4994 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81aea82c>] (__schedule) from [<81aebc40>] (__schedule_loop kernel/sched/core.c:6993 [inline]) [<81aea82c>] (__schedule) from [<81aebc40>] (schedule+0x2c/0x134 kernel/sched/core.c:7008) r10:ea9d5da4 r9:00000002 r8:60000113 r7:ea9d5dac r6:82918014 r5:860324c0 r4:860324c0 [<81aebc14>] (schedule) from [<81aebdcc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7065) r5:860324c0 r4:82918010 [<81aebdb4>] (schedule_preempt_disabled) from [<81aeed14>] (__mutex_lock_common kernel/locking/mutex.c:692 [inline]) [<81aebdb4>] (schedule_preempt_disabled) from [<81aeed14>] (__mutex_lock.constprop.0+0x480/0x9cc kernel/locking/mutex.c:776) [<81aee894>] (__mutex_lock.constprop.0) from [<81aef334>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1065) r10:8280c82c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9d5e28 r4:00000000 [<81aef320>] (__mutex_lock_slowpath) from [<81aef374>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:290) [<81aef338>] (mutex_lock) from [<804fd9cc>] (_vm_unmap_aliases+0x5c/0x238 mm/vmalloc.c:2957) [<804fd970>] (_vm_unmap_aliases) from [<805017c4>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fd970>] (_vm_unmap_aliases) from [<805017c4>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302b005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86055180 r4:00000000 [<80501658>] (vfree) from [<8056f950>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:860324c0 r8:00800000 r7:00000000 r6:8302b000 r5:00001000 r4:7f053000 [<8056f920>] (execmem_free) from [<803cf290>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:e0145000 [<803cf280>] (bpf_jit_free_exec) from [<803cf670>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803cf280>] (bpf_jit_free_exec) from [<803cf670>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf60c>] (bpf_jit_free) from [<803d0684>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2968) r5:86023b94 r4:86023b94 [<803d053c>] (bpf_prog_free_deferred) from [<802766b8>] (process_one_work+0x1c8/0x59c kernel/workqueue.c:3276) r7:dddd0d80 r6:8302b000 r5:86023b94 r4:86050c00 [<802764f0>] (process_one_work) from [<80277478>] (process_scheduled_works kernel/workqueue.c:3359 [inline]) [<802764f0>] (process_one_work) from [<80277478>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3440) r10:dddd0d80 r9:86050c30 r8:860324c0 r7:82804d80 r6:dddd0da0 r5:dddd0d80 r4:86050c00 [<8027730c>] (worker_thread) from [<802814a4>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:ea9d1e88 r8:86050b80 r7:86050c00 r6:8027730c r5:860324c0 r4:86055c80 [<80281388>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9d5fb0 to 0xea9d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281388 r4:86055c80 INFO: task kworker/0:264:4994 is blocked on a mutex likely owned by task kworker/0:250:4958. task:kworker/0:250 state:R running task stack:0 pid:4958 tgid:4958 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81aea82c>] (__schedule) from [<81aec078>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7238) r10:8280c880 r9:86086e40 r8:80200c04 r7:ea99dd7c r6:ffffffff r5:86086e40 r4:00000000 [<81aec038>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea99dd48 to 0xea99dd90) dd40: dba13000 eaf19000 00000000 802387d0 82ad3620 82ad4264 dd60: 7f047000 eaf19000 00000000 00000001 8280c880 ea99ddbc eaf19000 ea99dd98 dd80: 8022f700 802387e8 80000013 ffffffff r5:80000013 r4:802387e8 [<8022f6a0>] (flush_tlb_kernel_range) from [<804fd77c>] (__purge_vmap_area_lazy+0x298/0x48c mm/vmalloc.c:2382) [<804fd4e4>] (__purge_vmap_area_lazy) from [<804fdb58>] (_vm_unmap_aliases+0x1e8/0x238 mm/vmalloc.c:2996) r10:00000000 r9:ea99dde0 r8:00000000 r7:ffffffff r6:00000008 r5:ea99de28 r4:ea99dde0 [<804fd970>] (_vm_unmap_aliases) from [<805017c4>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fd970>] (_vm_unmap_aliases) from [<805017c4>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302b005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e884c0 r4:00000000 [<80501658>] (vfree) from [<8056f950>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:86086e40 r8:00800000 r7:00000000 r6:8302b000 r5:00001000 r4:7f051000 [<8056f920>] (execmem_free) from [<803cf290>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:e014b000 [<803cf280>] (bpf_jit_free_exec) from [<803cf670>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803cf280>] (bpf_jit_free_exec) from [<803cf670>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf60c>] (bpf_jit_free) from [<803d0684>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2968) r5:860a0b94 r4:860a0b94 [<803d053c>] (bpf_prog_free_deferred) from [<802766b8>] (process_one_work+0x1c8/0x59c kernel/workqueue.c:3276) r7:dddd0d80 r6:8302b000 r5:860a0b94 r4:85e2b280 [<802764f0>] (process_one_work) from [<80277478>] (process_scheduled_works kernel/workqueue.c:3359 [inline]) [<802764f0>] (process_one_work) from [<80277478>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3440) r10:dddd0d80 r9:85e2b2b0 r8:86086e40 r7:82804d80 r6:dddd0da0 r5:dddd0d80 r4:85e2b280 [<8027730c>] (worker_thread) from [<802814a4>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:ea96de88 r8:85e2b200 r7:85e2b280 r6:8027730c r5:86086e40 r4:85e202c0 [<80281388>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea99dfb0 to 0xea99dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281388 r4:85e202c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:265:4996 blocked for more than 431 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:265 state:D stack:0 pid:4996 tgid:4996 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81aea82c>] (__schedule) from [<81aebc40>] (__schedule_loop kernel/sched/core.c:6993 [inline]) [<81aea82c>] (__schedule) from [<81aebc40>] (schedule+0x2c/0x134 kernel/sched/core.c:7008) r10:ea9ddda4 r9:00000002 r8:60000113 r7:ea9dddac r6:82918014 r5:86031880 r4:86031880 [<81aebc14>] (schedule) from [<81aebdcc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7065) r5:86031880 r4:82918010 [<81aebdb4>] (schedule_preempt_disabled) from [<81aeed14>] (__mutex_lock_common kernel/locking/mutex.c:692 [inline]) [<81aebdb4>] (schedule_preempt_disabled) from [<81aeed14>] (__mutex_lock.constprop.0+0x480/0x9cc kernel/locking/mutex.c:776) [<81aee894>] (__mutex_lock.constprop.0) from [<81aef334>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1065) r10:8280c82c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9dde28 r4:00000000 [<81aef320>] (__mutex_lock_slowpath) from [<81aef374>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:290) [<81aef338>] (mutex_lock) from [<804fd9cc>] (_vm_unmap_aliases+0x5c/0x238 mm/vmalloc.c:2957) [<804fd970>] (_vm_unmap_aliases) from [<805017c4>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fd970>] (_vm_unmap_aliases) from [<805017c4>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302b005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:860552c0 r4:00000000 [<80501658>] (vfree) from [<8056f950>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:86031880 r8:00800000 r7:00000000 r6:8302b000 r5:00001000 r4:7f051000 [<8056f920>] (execmem_free) from [<803cf290>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:dfb31000 [<803cf280>] (bpf_jit_free_exec) from [<803cf670>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803cf280>] (bpf_jit_free_exec) from [<803cf670>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf60c>] (bpf_jit_free) from [<803d0684>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2968) r5:86024394 r4:86024394 [<803d053c>] (bpf_prog_free_deferred) from [<802766b8>] (process_one_work+0x1c8/0x59c kernel/workqueue.c:3276) r7:dddd0d80 r6:8302b000 r5:86024394 r4:86050a00 [<802764f0>] (process_one_work) from [<80277478>] (process_scheduled_works kernel/workqueue.c:3359 [inline]) [<802764f0>] (process_one_work) from [<80277478>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3440) r10:00000000 r9:86050a30 r8:86031880 r7:82804d80 r6:dddd0da0 r5:dddd0d80 r4:86050a00 [<8027730c>] (worker_thread) from [<802814a4>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:ea9d1e88 r8:86050980 r7:86050a00 r6:8027730c r5:86031880 r4:86055480 [<80281388>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9ddfb0 to 0xea9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281388 r4:86055480 INFO: task kworker/0:265:4996 is blocked on a mutex likely owned by task kworker/0:250:4958. task:kworker/0:250 state:R running task stack:0 pid:4958 tgid:4958 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81aea82c>] (__schedule) from [<81aec078>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7238) r10:8280c880 r9:86086e40 r8:80200c04 r7:ea99dd7c r6:ffffffff r5:86086e40 r4:00000000 [<81aec038>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea99dd48 to 0xea99dd90) dd40: dba13000 eaf19000 00000000 802387d0 82ad3620 82ad4264 dd60: 7f047000 eaf19000 00000000 00000001 8280c880 ea99ddbc eaf19000 ea99dd98 dd80: 8022f700 802387e8 80000013 ffffffff r5:80000013 r4:802387e8 [<8022f6a0>] (flush_tlb_kernel_range) from [<804fd77c>] (__purge_vmap_area_lazy+0x298/0x48c mm/vmalloc.c:2382) [<804fd4e4>] (__purge_vmap_area_lazy) from [<804fdb58>] (_vm_unmap_aliases+0x1e8/0x238 mm/vmalloc.c:2996) r10:00000000 r9:ea99dde0 r8:00000000 r7:ffffffff r6:00000008 r5:ea99de28 r4:ea99dde0 [<804fd970>] (_vm_unmap_aliases) from [<805017c4>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fd970>] (_vm_unmap_aliases) from [<805017c4>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302b005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e884c0 r4:00000000 [<80501658>] (vfree) from [<8056f950>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:86086e40 r8:00800000 r7:00000000 r6:8302b000 r5:00001000 r4:7f051000 [<8056f920>] (execmem_free) from [<803cf290>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:e014b000 [<803cf280>] (bpf_jit_free_exec) from [<803cf670>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803cf280>] (bpf_jit_free_exec) from [<803cf670>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf60c>] (bpf_jit_free) from [<803d0684>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2968) r5:860a0b94 r4:860a0b94 [<803d053c>] (bpf_prog_free_deferred) from [<802766b8>] (process_one_work+0x1c8/0x59c kernel/workqueue.c:3276) r7:dddd0d80 r6:8302b000 r5:860a0b94 r4:85e2b280 [<802764f0>] (process_one_work) from [<80277478>] (process_scheduled_works kernel/workqueue.c:3359 [inline]) [<802764f0>] (process_one_work) from [<80277478>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3440) r10:dddd0d80 r9:85e2b2b0 r8:86086e40 r7:82804d80 r6:dddd0da0 r5:dddd0d80 r4:85e2b280 [<8027730c>] (worker_thread) from [<802814a4>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:ea96de88 r8:85e2b200 r7:85e2b280 r6:8027730c r5:86086e40 r4:85e202c0 [<80281388>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea99dfb0 to 0xea99dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281388 r4:85e202c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:267:5000 blocked for more than 431 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:267 state:D stack:0 pid:5000 tgid:5000 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81aea82c>] (__schedule) from [<81aebc40>] (__schedule_loop kernel/sched/core.c:6993 [inline]) [<81aea82c>] (__schedule) from [<81aebc40>] (schedule+0x2c/0x134 kernel/sched/core.c:7008) r10:ea9f9da4 r9:00000002 r8:60000013 r7:ea9f9dac r6:82918014 r5:860b3100 r4:860b3100 [<81aebc14>] (schedule) from [<81aebdcc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7065) r5:860b3100 r4:82918010 [<81aebdb4>] (schedule_preempt_disabled) from [<81aeed14>] (__mutex_lock_common kernel/locking/mutex.c:692 [inline]) [<81aebdb4>] (schedule_preempt_disabled) from [<81aeed14>] (__mutex_lock.constprop.0+0x480/0x9cc kernel/locking/mutex.c:776) [<81aee894>] (__mutex_lock.constprop.0) from [<81aef334>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1065) r10:8280c82c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9f9e28 r4:00000000 [<81aef320>] (__mutex_lock_slowpath) from [<81aef374>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:290) [<81aef338>] (mutex_lock) from [<804fd9cc>] (_vm_unmap_aliases+0x5c/0x238 mm/vmalloc.c:2957) [<804fd970>] (_vm_unmap_aliases) from [<805017c4>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fd970>] (_vm_unmap_aliases) from [<805017c4>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302b005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86055940 r4:00000000 [<80501658>] (vfree) from [<8056f950>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:860b3100 r8:00800000 r7:00000000 r6:8302b000 r5:00001000 r4:7f057000 [<8056f920>] (execmem_free) from [<803cf290>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:ea771000 [<803cf280>] (bpf_jit_free_exec) from [<803cf670>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803cf280>] (bpf_jit_free_exec) from [<803cf670>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf60c>] (bpf_jit_free) from [<803d0684>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2968) r5:86022b94 r4:86022b94 [<803d053c>] (bpf_prog_free_deferred) from [<802766b8>] (process_one_work+0x1c8/0x59c kernel/workqueue.c:3276) r7:dddd0d80 r6:8302b000 r5:86022b94 r4:86050700 [<802764f0>] (process_one_work) from [<80277478>] (process_scheduled_works kernel/workqueue.c:3359 [inline]) [<802764f0>] (process_one_work) from [<80277478>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3440) r10:dddd0d80 r9:86050730 r8:860b3100 r7:82804d80 r6:dddd0da0 r5:dddd0d80 r4:86050700 [<8027730c>] (worker_thread) from [<802814a4>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:ea9d9e88 r8:86050680 r7:86050700 r6:8027730c r5:860b3100 r4:8603fec0 [<80281388>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9f9fb0 to 0xea9f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281388 r4:8603fec0 INFO: task kworker/0:267:5000 is blocked on a mutex likely owned by task kworker/0:250:4958. task:kworker/0:250 state:R running task stack:0 pid:4958 tgid:4958 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81aea82c>] (__schedule) from [<81aec078>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7238) r10:8280c880 r9:86086e40 r8:80200c04 r7:ea99dd7c r6:ffffffff r5:86086e40 r4:00000000 [<81aec038>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea99dd48 to 0xea99dd90) dd40: dba13000 eaf19000 00000000 802387d0 82ad3620 82ad4264 dd60: 7f047000 eaf19000 00000000 00000001 8280c880 ea99ddbc eaf19000 ea99dd98 dd80: 8022f700 802387e8 80000013 ffffffff r5:80000013 r4:802387e8 [<8022f6a0>] (flush_tlb_kernel_range) from [<804fd77c>] (__purge_vmap_area_lazy+0x298/0x48c mm/vmalloc.c:2382) [<804fd4e4>] (__purge_vmap_area_lazy) from [<804fdb58>] (_vm_unmap_aliases+0x1e8/0x238 mm/vmalloc.c:2996) r10:00000000 r9:ea99dde0 r8:00000000 r7:ffffffff r6:00000008 r5:ea99de28 r4:ea99dde0 [<804fd970>] (_vm_unmap_aliases) from [<805017c4>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fd970>] (_vm_unmap_aliases) from [<805017c4>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302b005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e884c0 r4:00000000 [<80501658>] (vfree) from [<8056f950>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:86086e40 r8:00800000 r7:00000000 r6:8302b000 r5:00001000 r4:7f051000 [<8056f920>] (execmem_free) from [<803cf290>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:e014b000 [<803cf280>] (bpf_jit_free_exec) from [<803cf670>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803cf280>] (bpf_jit_free_exec) from [<803cf670>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf60c>] (bpf_jit_free) from [<803d0684>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2968) r5:860a0b94 r4:860a0b94 [<803d053c>] (bpf_prog_free_deferred) from [<802766b8>] (process_one_work+0x1c8/0x59c kernel/workqueue.c:3276) r7:dddd0d80 r6:8302b000 r5:860a0b94 r4:85e2b280 [<802764f0>] (process_one_work) from [<80277478>] (process_scheduled_works kernel/workqueue.c:3359 [inline]) [<802764f0>] (process_one_work) from [<80277478>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3440) r10:dddd0d80 r9:85e2b2b0 r8:86086e40 r7:82804d80 r6:dddd0da0 r5:dddd0d80 r4:85e2b280 [<8027730c>] (worker_thread) from [<802814a4>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:ea96de88 r8:85e2b200 r7:85e2b280 r6:8027730c r5:86086e40 r4:85e202c0 [<80281388>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea99dfb0 to 0xea99dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281388 r4:85e202c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:268:5001 blocked for more than 431 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:268 state:D stack:0 pid:5001 tgid:5001 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81aea82c>] (__schedule) from [<81aebc40>] (__schedule_loop kernel/sched/core.c:6993 [inline]) [<81aea82c>] (__schedule) from [<81aebc40>] (schedule+0x2c/0x134 kernel/sched/core.c:7008) r10:ea9e5da4 r9:00000002 r8:60000013 r7:ea9e5dac r6:82918014 r5:86033d40 r4:86033d40 [<81aebc14>] (schedule) from [<81aebdcc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7065) r5:86033d40 r4:82918010 [<81aebdb4>] (schedule_preempt_disabled) from [<81aeed14>] (__mutex_lock_common kernel/locking/mutex.c:692 [inline]) [<81aebdb4>] (schedule_preempt_disabled) from [<81aeed14>] (__mutex_lock.constprop.0+0x480/0x9cc kernel/locking/mutex.c:776) [<81aee894>] (__mutex_lock.constprop.0) from [<81aef334>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1065) r10:8280c82c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9e5e28 r4:00000000 [<81aef320>] (__mutex_lock_slowpath) from [<81aef374>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:290) [<81aef338>] (mutex_lock) from [<804fd9cc>] (_vm_unmap_aliases+0x5c/0x238 mm/vmalloc.c:2957) [<804fd970>] (_vm_unmap_aliases) from [<805017c4>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fd970>] (_vm_unmap_aliases) from [<805017c4>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302b005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86043c80 r4:00000000 [<80501658>] (vfree) from [<8056f950>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:86033d40 r8:00800000 r7:00000000 r6:8302b000 r5:00001000 r4:7f059000 [<8056f920>] (execmem_free) from [<803cf290>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:ea83b000 [<803cf280>] (bpf_jit_free_exec) from [<803cf670>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803cf280>] (bpf_jit_free_exec) from [<803cf670>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf60c>] (bpf_jit_free) from [<803d0684>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2968) r5:86022394 r4:86022394 [<803d053c>] (bpf_prog_free_deferred) from [<802766b8>] (process_one_work+0x1c8/0x59c kernel/workqueue.c:3276) r7:dddd0d80 r6:8302b000 r5:86022394 r4:86050a80 [<802764f0>] (process_one_work) from [<80277478>] (process_scheduled_works kernel/workqueue.c:3359 [inline]) [<802764f0>] (process_one_work) from [<80277478>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3440) r10:00000000 r9:86050ab0 r8:86033d40 r7:82804d80 r6:dddd0da0 r5:dddd0d80 r4:86050a80 [<8027730c>] (worker_thread) from [<802814a4>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:ea9f9e88 r8:86050580 r7:86050a80 r6:8027730c r5:86033d40 r4:8603fec0 [<80281388>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9e5fb0 to 0xea9e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281388 r4:8603fec0 INFO: task kworker/0:268:5001 is blocked on a mutex likely owned by task kworker/0:250:4958. task:kworker/0:250 state:R running task stack:0 pid:4958 tgid:4958 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81aea82c>] (__schedule) from [<81aec078>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7238) r10:8280c880 r9:86086e40 r8:80200c04 r7:ea99dd7c r6:ffffffff r5:86086e40 r4:00000000 [<81aec038>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea99dd48 to 0xea99dd90) dd40: dba13000 eaf19000 00000000 802387d0 82ad3620 82ad4264 dd60: 7f047000 eaf19000 00000000 00000001 8280c880 ea99ddbc eaf19000 ea99dd98 dd80: 8022f700 802387e8 80000013 ffffffff r5:80000013 r4:802387e8 [<8022f6a0>] (flush_tlb_kernel_range) from [<804fd77c>] (__purge_vmap_area_lazy+0x298/0x48c mm/vmalloc.c:2382) [<804fd4e4>] (__purge_vmap_area_lazy) from [<804fdb58>] (_vm_unmap_aliases+0x1e8/0x238 mm/vmalloc.c:2996) r10:00000000 r9:ea99dde0 r8:00000000 r7:ffffffff r6:00000008 r5:ea99de28 r4:ea99dde0 [<804fd970>] (_vm_unmap_aliases) from [<805017c4>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fd970>] (_vm_unmap_aliases) from [<805017c4>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302b005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e884c0 r4:00000000 [<80501658>] (vfree) from [<8056f950>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:86086e40 r8:00800000 r7:00000000 r6:8302b000 r5:00001000 r4:7f051000 [<8056f920>] (execmem_free) from [<803cf290>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:e014b000 [<803cf280>] (bpf_jit_free_exec) from [<803cf670>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803cf280>] (bpf_jit_free_exec) from [<803cf670>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf60c>] (bpf_jit_free) from [<803d0684>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2968) r5:860a0b94 r4:860a0b94 [<803d053c>] (bpf_prog_free_deferred) from [<802766b8>] (process_one_work+0x1c8/0x59c kernel/workqueue.c:3276) r7:dddd0d80 r6:8302b000 r5:860a0b94 r4:85e2b280 [<802764f0>] (process_one_work) from [<80277478>] (process_scheduled_works kernel/workqueue.c:3359 [inline]) [<802764f0>] (process_one_work) from [<80277478>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3440) r10:dddd0d80 r9:85e2b2b0 r8:86086e40 r7:82804d80 r6:dddd0da0 r5:dddd0d80 r4:85e2b280 [<8027730c>] (worker_thread) from [<802814a4>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:ea96de88 r8:85e2b200 r7:85e2b280 r6:8027730c r5:86086e40 r4:85e202c0 [<80281388>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea99dfb0 to 0xea99dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281388 r4:85e202c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:270:5005 blocked for more than 431 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:270 state:D stack:0 pid:5005 tgid:5005 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81aea82c>] (__schedule) from [<81aebc40>] (__schedule_loop kernel/sched/core.c:6993 [inline]) [<81aea82c>] (__schedule) from [<81aebc40>] (schedule+0x2c/0x134 kernel/sched/core.c:7008) r10:eaa05da4 r9:00000002 r8:60000013 r7:eaa05dac r6:82918014 r5:860b0c40 r4:860b0c40 [<81aebc14>] (schedule) from [<81aebdcc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7065) r5:860b0c40 r4:82918010 [<81aebdb4>] (schedule_preempt_disabled) from [<81aeed14>] (__mutex_lock_common kernel/locking/mutex.c:692 [inline]) [<81aebdb4>] (schedule_preempt_disabled) from [<81aeed14>] (__mutex_lock.constprop.0+0x480/0x9cc kernel/locking/mutex.c:776) [<81aee894>] (__mutex_lock.constprop.0) from [<81aef334>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1065) r10:8280c82c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa05e28 r4:00000000 [<81aef320>] (__mutex_lock_slowpath) from [<81aef374>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:290) [<81aef338>] (mutex_lock) from [<804fd9cc>] (_vm_unmap_aliases+0x5c/0x238 mm/vmalloc.c:2957) [<804fd970>] (_vm_unmap_aliases) from [<805017c4>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fd970>] (_vm_unmap_aliases) from [<805017c4>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302b005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e2b800 r4:00000000 [<80501658>] (vfree) from [<8056f950>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:860b0c40 r8:00800000 r7:00000000 r6:8302b000 r5:00001000 r4:7f05b000 [<8056f920>] (execmem_free) from [<803cf290>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:eaa17000 [<803cf280>] (bpf_jit_free_exec) from [<803cf670>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803cf280>] (bpf_jit_free_exec) from [<803cf670>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf60c>] (bpf_jit_free) from [<803d0684>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2968) r5:85d76394 r4:85d76394 [<803d053c>] (bpf_prog_free_deferred) from [<802766b8>] (process_one_work+0x1c8/0x59c kernel/workqueue.c:3276) r7:dddd0d80 r6:8302b000 r5:85d76394 r4:86050200 [<802764f0>] (process_one_work) from [<80277478>] (process_scheduled_works kernel/workqueue.c:3359 [inline]) [<802764f0>] (process_one_work) from [<80277478>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3440) r10:00000000 r9:86050230 r8:860b0c40 r7:82804d80 r6:dddd0da0 r5:dddd0d80 r4:86050200 [<8027730c>] (worker_thread) from [<802814a4>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:ea9d9e88 r8:86050180 r7:86050200 r6:8027730c r5:860b0c40 r4:86043ac0 [<80281388>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa05fb0 to 0xeaa05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281388 r4:86043ac0 INFO: task kworker/0:270:5005 is blocked on a mutex likely owned by task kworker/0:250:4958. task:kworker/0:250 state:R running task stack:0 pid:4958 tgid:4958 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81aea82c>] (__schedule) from [<81aec078>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7238) r10:8280c880 r9:86086e40 r8:80200c04 r7:ea99dd7c r6:ffffffff r5:86086e40 r4:00000000 [<81aec038>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea99dd48 to 0xea99dd90) dd40: dba13000 eaf19000 00000000 802387d0 82ad3620 82ad4264 dd60: 7f047000 eaf19000 00000000 00000001 8280c880 ea99ddbc eaf19000 ea99dd98 dd80: 8022f700 802387e8 80000013 ffffffff r5:80000013 r4:802387e8 [<8022f6a0>] (flush_tlb_kernel_range) from [<804fd77c>] (__purge_vmap_area_lazy+0x298/0x48c mm/vmalloc.c:2382) [<804fd4e4>] (__purge_vmap_area_lazy) from [<804fdb58>] (_vm_unmap_aliases+0x1e8/0x238 mm/vmalloc.c:2996) r10:00000000 r9:ea99dde0 r8:00000000 r7:ffffffff r6:00000008 r5:ea99de28 r4:ea99dde0 [<804fd970>] (_vm_unmap_aliases) from [<805017c4>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fd970>] (_vm_unmap_aliases) from [<805017c4>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302b005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e884c0 r4:00000000 [<80501658>] (vfree) from [<8056f950>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:86086e40 r8:00800000 r7:00000000 r6:8302b000 r5:00001000 r4:7f051000 [<8056f920>] (execmem_free) from [<803cf290>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:e014b000 [<803cf280>] (bpf_jit_free_exec) from [<803cf670>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803cf280>] (bpf_jit_free_exec) from [<803cf670>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf60c>] (bpf_jit_free) from [<803d0684>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2968) r5:860a0b94 r4:860a0b94 [<803d053c>] (bpf_prog_free_deferred) from [<802766b8>] (process_one_work+0x1c8/0x59c kernel/workqueue.c:3276) r7:dddd0d80 r6:8302b000 r5:860a0b94 r4:85e2b280 [<802764f0>] (process_one_work) from [<80277478>] (process_scheduled_works kernel/workqueue.c:3359 [inline]) [<802764f0>] (process_one_work) from [<80277478>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3440) r10:dddd0d80 r9:85e2b2b0 r8:86086e40 r7:82804d80 r6:dddd0da0 r5:dddd0d80 r4:85e2b280 [<8027730c>] (worker_thread) from [<802814a4>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:ea96de88 r8:85e2b200 r7:85e2b280 r6:8027730c r5:86086e40 r4:85e202c0 [<80281388>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea99dfb0 to 0xea99dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281388 r4:85e202c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:178:5011 blocked for more than 431 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:178 state:D stack:0 pid:5011 tgid:5011 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81aea82c>] (__schedule) from [<81aebc40>] (__schedule_loop kernel/sched/core.c:6993 [inline]) [<81aea82c>] (__schedule) from [<81aebc40>] (schedule+0x2c/0x134 kernel/sched/core.c:7008) r10:eaa45da4 r9:00000002 r8:60000113 r7:eaa45dac r6:82918014 r5:86033100 r4:86033100 [<81aebc14>] (schedule) from [<81aebdcc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7065) r5:86033100 r4:82918010 [<81aebdb4>] (schedule_preempt_disabled) from [<81aeed14>] (__mutex_lock_common kernel/locking/mutex.c:692 [inline]) [<81aebdb4>] (schedule_preempt_disabled) from [<81aeed14>] (__mutex_lock.constprop.0+0x480/0x9cc kernel/locking/mutex.c:776) [<81aee894>] (__mutex_lock.constprop.0) from [<81aef334>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1065) r10:8280c82c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa45e28 r4:00000000 [<81aef320>] (__mutex_lock_slowpath) from [<81aef374>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:290) [<81aef338>] (mutex_lock) from [<804fd9cc>] (_vm_unmap_aliases+0x5c/0x238 mm/vmalloc.c:2957) [<804fd970>] (_vm_unmap_aliases) from [<805017c4>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fd970>] (_vm_unmap_aliases) from [<805017c4>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302ae05 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e88180 r4:00000000 [<80501658>] (vfree) from [<8056f950>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:86033100 r8:01800000 r7:00000000 r6:8302ae00 r5:00001000 r4:7f04f000 [<8056f920>] (execmem_free) from [<803cf290>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:ea975000 [<803cf280>] (bpf_jit_free_exec) from [<803cf670>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803cf280>] (bpf_jit_free_exec) from [<803cf670>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf60c>] (bpf_jit_free) from [<803d0684>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2968) r5:85fc9394 r4:85fc9394 [<803d053c>] (bpf_prog_free_deferred) from [<802766b8>] (process_one_work+0x1c8/0x59c kernel/workqueue.c:3276) r7:ddde4d80 r6:8302ae00 r5:85fc9394 r4:86050c80 [<802764f0>] (process_one_work) from [<80277478>] (process_scheduled_works kernel/workqueue.c:3359 [inline]) [<802764f0>] (process_one_work) from [<80277478>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3440) r10:ddde4d80 r9:86050cb0 r8:86033100 r7:82804d80 r6:ddde4da0 r5:ddde4d80 r4:86050c80 [<8027730c>] (worker_thread) from [<802814a4>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:ea9a9e88 r8:86050d80 r7:86050c80 r6:8027730c r5:86033100 r4:85e02dc0 [<80281388>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa45fb0 to 0xeaa45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281388 r4:85e02dc0 INFO: task kworker/1:178:5011 is blocked on a mutex likely owned by task kworker/0:250:4958. task:kworker/0:250 state:R running task stack:0 pid:4958 tgid:4958 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81aea82c>] (__schedule) from [<81aec078>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7238) r10:8280c880 r9:86086e40 r8:80200c04 r7:ea99dd7c r6:ffffffff r5:86086e40 r4:00000000 [<81aec038>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea99dd48 to 0xea99dd90) dd40: dba13000 eaf19000 00000000 802387d0 82ad3620 82ad4264 dd60: 7f047000 eaf19000 00000000 00000001 8280c880 ea99ddbc eaf19000 ea99dd98 dd80: 8022f700 802387e8 80000013 ffffffff r5:80000013 r4:802387e8 [<8022f6a0>] (flush_tlb_kernel_range) from [<804fd77c>] (__purge_vmap_area_lazy+0x298/0x48c mm/vmalloc.c:2382) [<804fd4e4>] (__purge_vmap_area_lazy) from [<804fdb58>] (_vm_unmap_aliases+0x1e8/0x238 mm/vmalloc.c:2996) r10:00000000 r9:ea99dde0 r8:00000000 r7:ffffffff r6:00000008 r5:ea99de28 r4:ea99dde0 [<804fd970>] (_vm_unmap_aliases) from [<805017c4>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fd970>] (_vm_unmap_aliases) from [<805017c4>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302b005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e884c0 r4:00000000 [<80501658>] (vfree) from [<8056f950>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:86086e40 r8:00800000 r7:00000000 r6:8302b000 r5:00001000 r4:7f051000 [<8056f920>] (execmem_free) from [<803cf290>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:e014b000 [<803cf280>] (bpf_jit_free_exec) from [<803cf670>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803cf280>] (bpf_jit_free_exec) from [<803cf670>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf60c>] (bpf_jit_free) from [<803d0684>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2968) r5:860a0b94 r4:860a0b94 [<803d053c>] (bpf_prog_free_deferred) from [<802766b8>] (process_one_work+0x1c8/0x59c kernel/workqueue.c:3276) r7:dddd0d80 r6:8302b000 r5:860a0b94 r4:85e2b280 [<802764f0>] (process_one_work) from [<80277478>] (process_scheduled_works kernel/workqueue.c:3359 [inline]) [<802764f0>] (process_one_work) from [<80277478>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3440) r10:dddd0d80 r9:85e2b2b0 r8:86086e40 r7:82804d80 r6:dddd0da0 r5:dddd0d80 r4:85e2b280 [<8027730c>] (worker_thread) from [<802814a4>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:ea96de88 r8:85e2b200 r7:85e2b280 r6:8027730c r5:86086e40 r4:85e202c0 [<80281388>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea99dfb0 to 0xea99dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281388 r4:85e202c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 29 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT Hardware name: ARM-Versatile Express Call trace: [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c arch/arm/kernel/traps.c:257) r7:60000193 r6:60000193 r5:822a8844 r4:00000000 [<80201af0>] (show_stack) from [<8021e410>] (__dump_stack lib/dump_stack.c:94 [inline]) [<80201af0>] (show_stack) from [<8021e410>] (dump_stack_lvl+0x5c/0x70 lib/dump_stack.c:120) [<8021e3b4>] (dump_stack_lvl) from [<8021e43c>] (dump_stack+0x18/0x1c lib/dump_stack.c:129) r7:00000000 r6:00000113 r5:00000001 r4:00000001 [<8021e424>] (dump_stack) from [<81ad425c>] (nmi_cpu_backtrace+0x150/0x170 lib/nmi_backtrace.c:113) [<81ad410c>] (nmi_cpu_backtrace) from [<81ad43ac>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8 lib/nmi_backtrace.c:62) r7:00000001 r6:8280c550 r5:8281afb8 r4:ffffffff [<81ad427c>] (nmi_trigger_cpumask_backtrace) from [<8022f124>] (arch_trigger_cpumask_backtrace+0x18/0x1c arch/arm/kernel/smp.c:852) r9:82ac7834 r8:8280c6d8 r7:000275b6 r6:860338e8 r5:82804d80 r4:00000048 [<8022f10c>] (arch_trigger_cpumask_backtrace) from [<81adbe9c>] (trigger_all_cpu_backtrace include/linux/nmi.h:161 [inline]) [<8022f10c>] (arch_trigger_cpumask_backtrace) from [<81adbe9c>] (__sys_info lib/sys_info.c:157 [inline]) [<8022f10c>] (arch_trigger_cpumask_backtrace) from [<81adbe9c>] (sys_info+0x68/0xa8 lib/sys_info.c:165) [<81adbe34>] (sys_info) from [<80385278>] (check_hung_uninterruptible_tasks kernel/hung_task.c:346 [inline]) [<81adbe34>] (sys_info) from [<80385278>] (watchdog+0x59c/0x8d8 kernel/hung_task.c:515) r5:82804d80 r4:83fe6314 [<80384cdc>] (watchdog) from [<802814a4>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:df819e60 r8:83103500 r7:00000000 r6:80384cdc r5:831f8000 r4:838808c0 [<80281388>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf8d5fb0 to 0xdf8d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281388 r4:838808c0 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 4518 Comm: kworker/0:100 Not tainted syzkaller #0 PREEMPT Hardware name: ARM-Versatile Express Workqueue: events nsim_dev_hwstats_traffic_work PC is at queue_delayed_work_on+0x70/0x74 kernel/workqueue.c:2580 LR is at __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:179 [inline] LR is at _raw_spin_unlock_irqrestore+0x30/0x54 kernel/locking/spinlock.c:194 pc : [<80275cc4>] lr : [<81af4d28>] psr: 60000113 sp : e8461ea8 ip : e8461e18 fp : e8461ecc r10: 8302b005 r9 : 85eeee40 r8 : 60000113 r7 : 0000000a r6 : 83027900 r5 : 00000008 r4 : 858ffdec r3 : 85eeee40 r2 : 00000000 r1 : 00000000 r0 : 00000001 Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user Control: 30c5387d Table: 84d0c540 DAC: fffffffd Call trace: [<80275c54>] (queue_delayed_work_on) from [<80eb926c>] (queue_delayed_work include/linux/workqueue.h:684 [inline]) [<80275c54>] (queue_delayed_work_on) from [<80eb926c>] (schedule_delayed_work include/linux/workqueue.h:824 [inline]) [<80275c54>] (queue_delayed_work_on) from [<80eb926c>] (nsim_dev_hwstats_traffic_work+0xc8/0xe4 drivers/net/netdevsim/hwstats.c:51) r9:85eeee40 r8:00800000 r7:dddd0d80 r6:8302b000 r5:858ffdc4 r4:858ffdec [<80eb91a4>] (nsim_dev_hwstats_traffic_work) from [<802766b8>] (process_one_work+0x1c8/0x59c kernel/workqueue.c:3276) r9:85eeee40 r8:00800000 r7:dddd0d80 r6:8302b000 r5:858ffdec r4:85e0b800 [<802764f0>] (process_one_work) from [<80277478>] (process_scheduled_works kernel/workqueue.c:3359 [inline]) [<802764f0>] (process_one_work) from [<80277478>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3440) r10:00000000 r9:85e0b830 r8:85eeee40 r7:82804d80 r6:dddd0da0 r5:dddd0d80 r4:85e0b800 [<8027730c>] (worker_thread) from [<802814a4>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:e037de88 r8:85e0b780 r7:85e0b800 r6:8027730c r5:85eeee40 r4:85c51f80 [<80281388>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8461fb0 to 0xe8461ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281388 r4:85c51f80