INFO: task kworker/0:0:25511 blocked for more than 434 seconds. Tainted: G L syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:0 state:D stack:0 pid:25511 tgid:25511 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81ae864c>] (__schedule) from [<81ae9a60>] (__schedule_loop kernel/sched/core.c:6993 [inline]) [<81ae864c>] (__schedule) from [<81ae9a60>] (schedule+0x2c/0x134 kernel/sched/core.c:7008) r10:ebe19da4 r9:00000002 r8:60000013 r7:ebe19dac r6:82917d04 r5:8512ee40 r4:8512ee40 [<81ae9a34>] (schedule) from [<81ae9bec>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7065) r5:8512ee40 r4:82917d00 [<81ae9bd4>] (schedule_preempt_disabled) from [<81aecb34>] (__mutex_lock_common kernel/locking/mutex.c:692 [inline]) [<81ae9bd4>] (schedule_preempt_disabled) from [<81aecb34>] (__mutex_lock.constprop.0+0x480/0x9cc kernel/locking/mutex.c:776) [<81aec6b4>] (__mutex_lock.constprop.0) from [<81aed154>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1065) r10:8280c82c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebe19e28 r4:00000000 [<81aed140>] (__mutex_lock_slowpath) from [<81aed194>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:290) [<81aed158>] (mutex_lock) from [<804fd378>] (_vm_unmap_aliases+0x5c/0x238 mm/vmalloc.c:2957) [<804fd31c>] (_vm_unmap_aliases) from [<80501170>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fd31c>] (_vm_unmap_aliases) from [<80501170>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302b005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86c50bc0 r4:00000000 [<80501004>] (vfree) from [<8056f2cc>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:8512ee40 r8:00800000 r7:00000000 r6:8302b000 r5:00001000 r4:7f24e000 [<8056f29c>] (execmem_free) from [<803cee4c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:eb1f7000 [<803cee3c>] (bpf_jit_free_exec) from [<803cf22c>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803cee3c>] (bpf_jit_free_exec) from [<803cf22c>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf1c8>] (bpf_jit_free) from [<803d0160>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2941) r5:86aa9394 r4:86aa9394 [<803d0018>] (bpf_prog_free_deferred) from [<802766a0>] (process_one_work+0x1c8/0x59c kernel/workqueue.c:3276) r7:dddd0d80 r6:8302b000 r5:86aa9394 r4:86409980 [<802764d8>] (process_one_work) from [<80277460>] (process_scheduled_works kernel/workqueue.c:3359 [inline]) [<802764d8>] (process_one_work) from [<80277460>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3440) r10:00000000 r9:864099b0 r8:8512ee40 r7:82804d80 r6:dddd0da0 r5:dddd0d80 r4:86409980 [<802772f4>] (worker_thread) from [<8028141c>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:e02dde88 r8:86577600 r7:86409980 r6:802772f4 r5:8512ee40 r4:86250300 [<80281300>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebe19fb0 to 0xebe19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281300 r4:86250300 INFO: task kworker/0:0:25511 is blocked on a mutex likely owned by task kworker/1:2:29057. task:kworker/1:2 state:R running task stack:0 pid:29057 tgid:29057 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81ae864c>] (__schedule) from [<81ae9e98>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7238) r10:8280c880 r9:868d4980 r8:80200c04 r7:dfa1dd7c r6:ffffffff r5:868d4980 r4:00000000 [<81ae9e58>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfa1dd48 to 0xdfa1dd90) dd40: e09d1000 ea72b000 00000000 802387b0 82ad3620 82ad4264 dd60: 7f270000 ea72b000 00000000 00000001 8280c880 dfa1ddbc ea72b000 dfa1dd98 dd80: 8022f6e0 802387c8 80070013 ffffffff r5:80070013 r4:802387c8 [<8022f680>] (flush_tlb_kernel_range) from [<804fd128>] (__purge_vmap_area_lazy+0x298/0x48c mm/vmalloc.c:2382) [<804fce90>] (__purge_vmap_area_lazy) from [<804fd504>] (_vm_unmap_aliases+0x1e8/0x238 mm/vmalloc.c:2996) r10:00000000 r9:dfa1dde0 r8:00000000 r7:ffffffff r6:00000008 r5:dfa1de28 r4:dfa1dde0 [<804fd31c>] (_vm_unmap_aliases) from [<80501170>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fd31c>] (_vm_unmap_aliases) from [<80501170>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302ae05 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86cbd700 r4:00000000 [<80501004>] (vfree) from [<8056f2cc>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:868d4980 r8:01800000 r7:00000000 r6:8302ae00 r5:00001000 r4:7f23c000 [<8056f29c>] (execmem_free) from [<803cee4c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:eb0c7000 [<803cee3c>] (bpf_jit_free_exec) from [<803cf22c>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803cee3c>] (bpf_jit_free_exec) from [<803cf22c>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf1c8>] (bpf_jit_free) from [<803d0160>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2941) r5:85dc0b94 r4:85dc0b94 [<803d0018>] (bpf_prog_free_deferred) from [<802766a0>] (process_one_work+0x1c8/0x59c kernel/workqueue.c:3276) r7:ddde4d80 r6:8302ae00 r5:85dc0b94 r4:85e43b80 [<802764d8>] (process_one_work) from [<80277460>] (process_scheduled_works kernel/workqueue.c:3359 [inline]) [<802764d8>] (process_one_work) from [<80277460>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3440) r10:00000000 r9:85e43bb0 r8:868d4980 r7:82804d80 r6:ddde4da0 r5:ddde4d80 r4:85e43b80 [<802772f4>] (worker_thread) from [<8028141c>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:ea549e88 r8:8635d280 r7:85e43b80 r6:802772f4 r5:868d4980 r4:867e8900 [<80281300>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa1dfb0 to 0xdfa1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281300 r4:867e8900 INFO: task kworker/0:2:28986 blocked for more than 450 seconds. Tainted: G L syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:2 state:D stack:0 pid:28986 tgid:28986 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81ae864c>] (__schedule) from [<81ae9a60>] (__schedule_loop kernel/sched/core.c:6993 [inline]) [<81ae864c>] (__schedule) from [<81ae9a60>] (schedule+0x2c/0x134 kernel/sched/core.c:7008) r10:e01d1da4 r9:00000002 r8:60070113 r7:e01d1dac r6:82917d04 r5:85120c40 r4:85120c40 [<81ae9a34>] (schedule) from [<81ae9bec>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7065) r5:85120c40 r4:82917d00 [<81ae9bd4>] (schedule_preempt_disabled) from [<81aecb34>] (__mutex_lock_common kernel/locking/mutex.c:692 [inline]) [<81ae9bd4>] (schedule_preempt_disabled) from [<81aecb34>] (__mutex_lock.constprop.0+0x480/0x9cc kernel/locking/mutex.c:776) [<81aec6b4>] (__mutex_lock.constprop.0) from [<81aed154>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1065) r10:8280c82c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e01d1e28 r4:00000000 [<81aed140>] (__mutex_lock_slowpath) from [<81aed194>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:290) [<81aed158>] (mutex_lock) from [<804fd378>] (_vm_unmap_aliases+0x5c/0x238 mm/vmalloc.c:2957) [<804fd31c>] (_vm_unmap_aliases) from [<80501170>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fd31c>] (_vm_unmap_aliases) from [<80501170>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302b005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86c50d80 r4:00000000 [<80501004>] (vfree) from [<8056f2cc>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:85120c40 r8:00800000 r7:00000000 r6:8302b000 r5:00001000 r4:7f24c000 [<8056f29c>] (execmem_free) from [<803cee4c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:eb1e9000 [<803cee3c>] (bpf_jit_free_exec) from [<803cf22c>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803cee3c>] (bpf_jit_free_exec) from [<803cf22c>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf1c8>] (bpf_jit_free) from [<803d0160>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2941) r5:86a78b94 r4:86a78b94 [<803d0018>] (bpf_prog_free_deferred) from [<802766a0>] (process_one_work+0x1c8/0x59c kernel/workqueue.c:3276) r7:dddd0d80 r6:8302b000 r5:86a78b94 r4:88558100 [<802764d8>] (process_one_work) from [<80277460>] (process_scheduled_works kernel/workqueue.c:3359 [inline]) [<802764d8>] (process_one_work) from [<80277460>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3440) r10:00000000 r9:88558130 r8:85120c40 r7:82804d80 r6:dddd0da0 r5:dddd0d80 r4:88558100 [<802772f4>] (worker_thread) from [<8028141c>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:e02dde88 r8:852f0680 r7:88558100 r6:802772f4 r5:85120c40 r4:84e62200 [<80281300>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe01d1fb0 to 0xe01d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281300 r4:84e62200 INFO: task kworker/0:2:28986 is blocked on a mutex likely owned by task kworker/1:2:29057. task:kworker/1:2 state:R running task stack:0 pid:29057 tgid:29057 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81ae864c>] (__schedule) from [<81ae9e98>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7238) r10:8280c880 r9:868d4980 r8:80200c04 r7:dfa1dd7c r6:ffffffff r5:868d4980 r4:00000000 [<81ae9e58>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfa1dd48 to 0xdfa1dd90) dd40: e09d1000 ea72b000 00000000 802387b0 82ad3620 82ad4264 dd60: 7f270000 ea72b000 00000000 00000001 8280c880 dfa1ddbc ea72b000 dfa1dd98 dd80: 8022f6e0 802387c8 80070013 ffffffff r5:80070013 r4:802387c8 [<8022f680>] (flush_tlb_kernel_range) from [<804fd128>] (__purge_vmap_area_lazy+0x298/0x48c mm/vmalloc.c:2382) [<804fce90>] (__purge_vmap_area_lazy) from [<804fd504>] (_vm_unmap_aliases+0x1e8/0x238 mm/vmalloc.c:2996) r10:00000000 r9:dfa1dde0 r8:00000000 r7:ffffffff r6:00000008 r5:dfa1de28 r4:dfa1dde0 [<804fd31c>] (_vm_unmap_aliases) from [<80501170>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fd31c>] (_vm_unmap_aliases) from [<80501170>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302ae05 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86cbd700 r4:00000000 [<80501004>] (vfree) from [<8056f2cc>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:868d4980 r8:01800000 r7:00000000 r6:8302ae00 r5:00001000 r4:7f23c000 [<8056f29c>] (execmem_free) from [<803cee4c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:eb0c7000 [<803cee3c>] (bpf_jit_free_exec) from [<803cf22c>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803cee3c>] (bpf_jit_free_exec) from [<803cf22c>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf1c8>] (bpf_jit_free) from [<803d0160>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2941) r5:85dc0b94 r4:85dc0b94 [<803d0018>] (bpf_prog_free_deferred) from [<802766a0>] (process_one_work+0x1c8/0x59c kernel/workqueue.c:3276) r7:ddde4d80 r6:8302ae00 r5:85dc0b94 r4:85e43b80 [<802764d8>] (process_one_work) from [<80277460>] (process_scheduled_works kernel/workqueue.c:3359 [inline]) [<802764d8>] (process_one_work) from [<80277460>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3440) r10:00000000 r9:85e43bb0 r8:868d4980 r7:82804d80 r6:ddde4da0 r5:ddde4d80 r4:85e43b80 [<802772f4>] (worker_thread) from [<8028141c>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:ea549e88 r8:8635d280 r7:85e43b80 r6:802772f4 r5:868d4980 r4:867e8900 [<80281300>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa1dfb0 to 0xdfa1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281300 r4:867e8900 INFO: task kworker/1:3:29107 blocked for more than 455 seconds. Tainted: G L syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:3 state:D stack:0 pid:29107 tgid:29107 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81ae864c>] (__schedule) from [<81ae9a60>] (__schedule_loop kernel/sched/core.c:6993 [inline]) [<81ae864c>] (__schedule) from [<81ae9a60>] (schedule+0x2c/0x134 kernel/sched/core.c:7008) r10:eb1a1da4 r9:00000002 r8:600f0113 r7:eb1a1dac r6:82917d04 r5:86dbc980 r4:86dbc980 [<81ae9a34>] (schedule) from [<81ae9bec>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7065) r5:86dbc980 r4:82917d00 [<81ae9bd4>] (schedule_preempt_disabled) from [<81aecb34>] (__mutex_lock_common kernel/locking/mutex.c:692 [inline]) [<81ae9bd4>] (schedule_preempt_disabled) from [<81aecb34>] (__mutex_lock.constprop.0+0x480/0x9cc kernel/locking/mutex.c:776) [<81aec6b4>] (__mutex_lock.constprop.0) from [<81aed154>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1065) r10:8280c82c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1a1e28 r4:00000000 [<81aed140>] (__mutex_lock_slowpath) from [<81aed194>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:290) [<81aed158>] (mutex_lock) from [<804fd378>] (_vm_unmap_aliases+0x5c/0x238 mm/vmalloc.c:2957) [<804fd31c>] (_vm_unmap_aliases) from [<80501170>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fd31c>] (_vm_unmap_aliases) from [<80501170>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302ae05 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86cbd840 r4:00000000 [<80501004>] (vfree) from [<8056f2cc>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:86dbc980 r8:01800000 r7:00000000 r6:8302ae00 r5:00001000 r4:7f23a000 [<8056f29c>] (execmem_free) from [<803cee4c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:eb0c5000 [<803cee3c>] (bpf_jit_free_exec) from [<803cf22c>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803cee3c>] (bpf_jit_free_exec) from [<803cf22c>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf1c8>] (bpf_jit_free) from [<803d0160>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2941) r5:868c7b94 r4:868c7b94 [<803d0018>] (bpf_prog_free_deferred) from [<802766a0>] (process_one_work+0x1c8/0x59c kernel/workqueue.c:3276) r7:ddde4d80 r6:8302ae00 r5:868c7b94 r4:8643c080 [<802764d8>] (process_one_work) from [<80277460>] (process_scheduled_works kernel/workqueue.c:3359 [inline]) [<802764d8>] (process_one_work) from [<80277460>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3440) r10:ddde4d80 r9:8643c0b0 r8:86dbc980 r7:82804d80 r6:ddde4da0 r5:ddde4d80 r4:8643c080 [<802772f4>] (worker_thread) from [<8028141c>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:ea549e88 r8:861af000 r7:8643c080 r6:802772f4 r5:86dbc980 r4:86c4f240 [<80281300>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1a1fb0 to 0xeb1a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281300 r4:86c4f240 INFO: task kworker/1:3:29107 is blocked on a mutex likely owned by task kworker/1:2:29057. task:kworker/1:2 state:R running task stack:0 pid:29057 tgid:29057 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81ae864c>] (__schedule) from [<81ae9e98>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7238) r10:8280c880 r9:868d4980 r8:80200c04 r7:dfa1dd7c r6:ffffffff r5:868d4980 r4:00000000 [<81ae9e58>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfa1dd48 to 0xdfa1dd90) dd40: e1370000 ea72b000 00000000 802387b0 82ad3620 82ad4264 dd60: 7f270000 ea72b000 00000000 00000001 8280c880 dfa1ddbc ea72b000 dfa1dd98 dd80: 8022f6e0 802387c8 80070013 ffffffff r5:80070013 r4:802387c8 [<8022f680>] (flush_tlb_kernel_range) from [<804fd128>] (__purge_vmap_area_lazy+0x298/0x48c mm/vmalloc.c:2382) [<804fce90>] (__purge_vmap_area_lazy) from [<804fd504>] (_vm_unmap_aliases+0x1e8/0x238 mm/vmalloc.c:2996) r10:00000000 r9:dfa1dde0 r8:00000000 r7:ffffffff r6:00000008 r5:dfa1de28 r4:dfa1dde0 [<804fd31c>] (_vm_unmap_aliases) from [<80501170>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fd31c>] (_vm_unmap_aliases) from [<80501170>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302ae05 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86cbd700 r4:00000000 [<80501004>] (vfree) from [<8056f2cc>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:868d4980 r8:01800000 r7:00000000 r6:8302ae00 r5:00001000 r4:7f23c000 [<8056f29c>] (execmem_free) from [<803cee4c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:eb0c7000 [<803cee3c>] (bpf_jit_free_exec) from [<803cf22c>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803cee3c>] (bpf_jit_free_exec) from [<803cf22c>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf1c8>] (bpf_jit_free) from [<803d0160>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2941) r5:85dc0b94 r4:85dc0b94 [<803d0018>] (bpf_prog_free_deferred) from [<802766a0>] (process_one_work+0x1c8/0x59c kernel/workqueue.c:3276) r7:ddde4d80 r6:8302ae00 r5:85dc0b94 r4:85e43b80 [<802764d8>] (process_one_work) from [<80277460>] (process_scheduled_works kernel/workqueue.c:3359 [inline]) [<802764d8>] (process_one_work) from [<80277460>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3440) r10:00000000 r9:85e43bb0 r8:868d4980 r7:82804d80 r6:ddde4da0 r5:ddde4d80 r4:85e43b80 [<802772f4>] (worker_thread) from [<8028141c>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:ea549e88 r8:8635d280 r7:85e43b80 r6:802772f4 r5:868d4980 r4:867e8900 [<80281300>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa1dfb0 to 0xdfa1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281300 r4:867e8900 INFO: task kworker/1:9:29203 blocked for more than 435 seconds. Tainted: G L syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:9 state:D stack:0 pid:29203 tgid:29203 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81ae864c>] (__schedule) from [<81ae9a60>] (__schedule_loop kernel/sched/core.c:6993 [inline]) [<81ae864c>] (__schedule) from [<81ae9a60>] (schedule+0x2c/0x134 kernel/sched/core.c:7008) r10:dfb2dda4 r9:00000002 r8:60000013 r7:dfb2ddac r6:82917d04 r5:86dbd5c0 r4:86dbd5c0 [<81ae9a34>] (schedule) from [<81ae9bec>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7065) r5:86dbd5c0 r4:82917d00 [<81ae9bd4>] (schedule_preempt_disabled) from [<81aecb34>] (__mutex_lock_common kernel/locking/mutex.c:692 [inline]) [<81ae9bd4>] (schedule_preempt_disabled) from [<81aecb34>] (__mutex_lock.constprop.0+0x480/0x9cc kernel/locking/mutex.c:776) [<81aec6b4>] (__mutex_lock.constprop.0) from [<81aed154>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1065) r10:8280c82c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb2de28 r4:00000000 [<81aed140>] (__mutex_lock_slowpath) from [<81aed194>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:290) [<81aed158>] (mutex_lock) from [<804fd378>] (_vm_unmap_aliases+0x5c/0x238 mm/vmalloc.c:2957) [<804fd31c>] (_vm_unmap_aliases) from [<80501170>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fd31c>] (_vm_unmap_aliases) from [<80501170>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302ae05 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8636e340 r4:00000000 [<80501004>] (vfree) from [<8056f2cc>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:86dbd5c0 r8:01800000 r7:00000000 r6:8302ae00 r5:00001000 r4:7f22e000 [<8056f29c>] (execmem_free) from [<803cee4c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:eaf1d000 [<803cee3c>] (bpf_jit_free_exec) from [<803cf22c>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803cee3c>] (bpf_jit_free_exec) from [<803cf22c>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf1c8>] (bpf_jit_free) from [<803d0160>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2941) r5:86a8eb94 r4:86a8eb94 [<803d0018>] (bpf_prog_free_deferred) from [<802766a0>] (process_one_work+0x1c8/0x59c kernel/workqueue.c:3276) r7:ddde4d80 r6:8302ae00 r5:86a8eb94 r4:86633780 [<802764d8>] (process_one_work) from [<80277460>] (process_scheduled_works kernel/workqueue.c:3359 [inline]) [<802764d8>] (process_one_work) from [<80277460>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3440) r10:00000000 r9:866337b0 r8:86dbd5c0 r7:82804d80 r6:ddde4da0 r5:ddde4d80 r4:86633780 [<802772f4>] (worker_thread) from [<8028141c>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:eb1a1e88 r8:86366080 r7:86633780 r6:802772f4 r5:86dbd5c0 r4:85fbc980 [<80281300>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb2dfb0 to 0xdfb2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281300 r4:85fbc980 INFO: task kworker/1:9:29203 is blocked on a mutex likely owned by task kworker/1:2:29057. task:kworker/1:2 state:R running task stack:0 pid:29057 tgid:29057 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81ae864c>] (__schedule) from [<81ae9e98>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7238) r10:8280c880 r9:868d4980 r8:80200c04 r7:dfa1dd7c r6:ffffffff r5:868d4980 r4:00000000 [<81ae9e58>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfa1dd48 to 0xdfa1dd90) dd40: e1c4a000 ea72b000 00000000 802387b0 82ad3620 82ad4264 dd60: 7f270000 ea72b000 00000000 00000001 8280c880 dfa1ddbc ea72b000 dfa1dd98 dd80: 8022f6e0 802387c8 80070013 ffffffff r5:80070013 r4:802387c8 [<8022f680>] (flush_tlb_kernel_range) from [<804fd128>] (__purge_vmap_area_lazy+0x298/0x48c mm/vmalloc.c:2382) [<804fce90>] (__purge_vmap_area_lazy) from [<804fd504>] (_vm_unmap_aliases+0x1e8/0x238 mm/vmalloc.c:2996) r10:00000000 r9:dfa1dde0 r8:00000000 r7:ffffffff r6:00000008 r5:dfa1de28 r4:dfa1dde0 [<804fd31c>] (_vm_unmap_aliases) from [<80501170>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fd31c>] (_vm_unmap_aliases) from [<80501170>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302ae05 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86cbd700 r4:00000000 [<80501004>] (vfree) from [<8056f2cc>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:868d4980 r8:01800000 r7:00000000 r6:8302ae00 r5:00001000 r4:7f23c000 [<8056f29c>] (execmem_free) from [<803cee4c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:eb0c7000 [<803cee3c>] (bpf_jit_free_exec) from [<803cf22c>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803cee3c>] (bpf_jit_free_exec) from [<803cf22c>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf1c8>] (bpf_jit_free) from [<803d0160>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2941) r5:85dc0b94 r4:85dc0b94 [<803d0018>] (bpf_prog_free_deferred) from [<802766a0>] (process_one_work+0x1c8/0x59c kernel/workqueue.c:3276) r7:ddde4d80 r6:8302ae00 r5:85dc0b94 r4:85e43b80 [<802764d8>] (process_one_work) from [<80277460>] (process_scheduled_works kernel/workqueue.c:3359 [inline]) [<802764d8>] (process_one_work) from [<80277460>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3440) r10:00000000 r9:85e43bb0 r8:868d4980 r7:82804d80 r6:ddde4da0 r5:ddde4d80 r4:85e43b80 [<802772f4>] (worker_thread) from [<8028141c>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:ea549e88 r8:8635d280 r7:85e43b80 r6:802772f4 r5:868d4980 r4:867e8900 [<80281300>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa1dfb0 to 0xdfa1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281300 r4:867e8900 INFO: task kworker/1:10:29637 blocked for more than 442 seconds. Tainted: G L syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:10 state:D stack:0 pid:29637 tgid:29637 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81ae864c>] (__schedule) from [<81ae9a60>] (__schedule_loop kernel/sched/core.c:6993 [inline]) [<81ae864c>] (__schedule) from [<81ae9a60>] (schedule+0x2c/0x134 kernel/sched/core.c:7008) r10:dfaf9da4 r9:00000002 r8:60000013 r7:dfaf9dac r6:82917d04 r5:86dbb100 r4:86dbb100 [<81ae9a34>] (schedule) from [<81ae9bec>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7065) r5:86dbb100 r4:82917d00 [<81ae9bd4>] (schedule_preempt_disabled) from [<81aecb34>] (__mutex_lock_common kernel/locking/mutex.c:692 [inline]) [<81ae9bd4>] (schedule_preempt_disabled) from [<81aecb34>] (__mutex_lock.constprop.0+0x480/0x9cc kernel/locking/mutex.c:776) [<81aec6b4>] (__mutex_lock.constprop.0) from [<81aed154>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1065) r10:8280c82c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaf9e28 r4:00000000 [<81aed140>] (__mutex_lock_slowpath) from [<81aed194>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:290) [<81aed158>] (mutex_lock) from [<804fd378>] (_vm_unmap_aliases+0x5c/0x238 mm/vmalloc.c:2957) [<804fd31c>] (_vm_unmap_aliases) from [<80501170>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fd31c>] (_vm_unmap_aliases) from [<80501170>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302ae05 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8636ec80 r4:00000000 [<80501004>] (vfree) from [<8056f2cc>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:86dbb100 r8:01800000 r7:00000000 r6:8302ae00 r5:00001000 r4:7f015000 [<8056f29c>] (execmem_free) from [<803cee4c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:eaf1b000 [<803cee3c>] (bpf_jit_free_exec) from [<803cf22c>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803cee3c>] (bpf_jit_free_exec) from [<803cf22c>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf1c8>] (bpf_jit_free) from [<803d0160>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2941) r5:86a91b94 r4:86a91b94 [<803d0018>] (bpf_prog_free_deferred) from [<802766a0>] (process_one_work+0x1c8/0x59c kernel/workqueue.c:3276) r7:ddde4d80 r6:8302ae00 r5:86a91b94 r4:8683e400 [<802764d8>] (process_one_work) from [<80277460>] (process_scheduled_works kernel/workqueue.c:3359 [inline]) [<802764d8>] (process_one_work) from [<80277460>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3440) r10:00000000 r9:8683e430 r8:86dbb100 r7:82804d80 r6:ddde4da0 r5:ddde4d80 r4:8683e400 [<802772f4>] (worker_thread) from [<8028141c>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:dfa85e88 r8:86821180 r7:8683e400 r6:802772f4 r5:86dbb100 r4:8530b080 [<80281300>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaf9fb0 to 0xdfaf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281300 r4:8530b080 INFO: task kworker/1:10:29637 is blocked on a mutex likely owned by task kworker/1:2:29057. task:kworker/1:2 state:R running task stack:0 pid:29057 tgid:29057 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81ae864c>] (__schedule) from [<81ae9e98>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7238) r10:8280c880 r9:868d4980 r8:80200c04 r7:dfa1dd7c r6:ffffffff r5:868d4980 r4:00000000 [<81ae9e58>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfa1dd48 to 0xdfa1dd90) dd40: e1c4a000 ea72b000 00000000 802387b0 82ad3620 82ad4264 dd60: 7f270000 ea72b000 00000000 00000001 8280c880 dfa1ddbc ea72b000 dfa1dd98 dd80: 8022f6e0 802387c8 80070013 ffffffff r5:80070013 r4:802387c8 [<8022f680>] (flush_tlb_kernel_range) from [<804fd128>] (__purge_vmap_area_lazy+0x298/0x48c mm/vmalloc.c:2382) [<804fce90>] (__purge_vmap_area_lazy) from [<804fd504>] (_vm_unmap_aliases+0x1e8/0x238 mm/vmalloc.c:2996) r10:00000000 r9:dfa1dde0 r8:00000000 r7:ffffffff r6:00000008 r5:dfa1de28 r4:dfa1dde0 [<804fd31c>] (_vm_unmap_aliases) from [<80501170>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fd31c>] (_vm_unmap_aliases) from [<80501170>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302ae05 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86cbd700 r4:00000000 [<80501004>] (vfree) from [<8056f2cc>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:868d4980 r8:01800000 r7:00000000 r6:8302ae00 r5:00001000 r4:7f23c000 [<8056f29c>] (execmem_free) from [<803cee4c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:eb0c7000 [<803cee3c>] (bpf_jit_free_exec) from [<803cf22c>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803cee3c>] (bpf_jit_free_exec) from [<803cf22c>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf1c8>] (bpf_jit_free) from [<803d0160>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2941) r5:85dc0b94 r4:85dc0b94 [<803d0018>] (bpf_prog_free_deferred) from [<802766a0>] (process_one_work+0x1c8/0x59c kernel/workqueue.c:3276) r7:ddde4d80 r6:8302ae00 r5:85dc0b94 r4:85e43b80 [<802764d8>] (process_one_work) from [<80277460>] (process_scheduled_works kernel/workqueue.c:3359 [inline]) [<802764d8>] (process_one_work) from [<80277460>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3440) r10:00000000 r9:85e43bb0 r8:868d4980 r7:82804d80 r6:ddde4da0 r5:ddde4d80 r4:85e43b80 [<802772f4>] (worker_thread) from [<8028141c>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:ea549e88 r8:8635d280 r7:85e43b80 r6:802772f4 r5:868d4980 r4:867e8900 [<80281300>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa1dfb0 to 0xdfa1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281300 r4:867e8900 NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 29 Comm: khungtaskd Tainted: G L syzkaller #0 PREEMPT Tainted: [L]=SOFTLOCKUP Hardware name: ARM-Versatile Express Call trace: [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c arch/arm/kernel/traps.c:257) r7:60070193 r6:60070193 r5:822a80d8 r4:00000000 [<80201af0>] (show_stack) from [<8021e438>] (__dump_stack lib/dump_stack.c:94 [inline]) [<80201af0>] (show_stack) from [<8021e438>] (dump_stack_lvl+0x5c/0x70 lib/dump_stack.c:120) [<8021e3dc>] (dump_stack_lvl) from [<8021e464>] (dump_stack+0x18/0x1c lib/dump_stack.c:129) r7:00000000 r6:00070113 r5:00000001 r4:00000001 [<8021e44c>] (dump_stack) from [<81ad207c>] (nmi_cpu_backtrace+0x150/0x170 lib/nmi_backtrace.c:113) [<81ad1f2c>] (nmi_cpu_backtrace) from [<81ad21cc>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8 lib/nmi_backtrace.c:62) r7:00000001 r6:8280c550 r5:8281afb8 r4:ffffffff [<81ad209c>] (nmi_trigger_cpumask_backtrace) from [<8022f104>] (arch_trigger_cpumask_backtrace+0x18/0x1c arch/arm/kernel/smp.c:852) r9:82ac7834 r8:8280c6d8 r7:0006da08 r6:86dbb8e8 r5:82804d80 r4:00000048 [<8022f0ec>] (arch_trigger_cpumask_backtrace) from [<81ad9cbc>] (trigger_all_cpu_backtrace include/linux/nmi.h:161 [inline]) [<8022f0ec>] (arch_trigger_cpumask_backtrace) from [<81ad9cbc>] (__sys_info lib/sys_info.c:157 [inline]) [<8022f0ec>] (arch_trigger_cpumask_backtrace) from [<81ad9cbc>] (sys_info+0x68/0xa8 lib/sys_info.c:165) [<81ad9c54>] (sys_info) from [<80384f6c>] (check_hung_uninterruptible_tasks kernel/hung_task.c:346 [inline]) [<81ad9c54>] (sys_info) from [<80384f6c>] (watchdog+0x59c/0x8d8 kernel/hung_task.c:515) r5:82804d80 r4:8387b914 [<803849d0>] (watchdog) from [<8028141c>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:df819e60 r8:83386780 r7:00000000 r6:803849d0 r5:833d0000 r4:83335240 [<80281300>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf8d5fb0 to 0xdf8d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281300 r4:83335240 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 2808 Comm: pr/ttyAMA-1 Tainted: G L syzkaller #0 PREEMPT Tainted: [L]=SOFTLOCKUP Hardware name: ARM-Versatile Express PC is at selinux_policycap_netpeer security/selinux/include/security.h:153 [inline] PC is at selinux_ip_postroute+0x50/0x37c security/selinux/hooks.c:5997 LR is at selinux_ip_postroute+0x50/0x37c security/selinux/hooks.c:5989 pc : [<807ca424>] lr : [<807ca424>] psr: 40030113 sp : df8019b0 ip : df801a0c fp : df801a3c r10: 81e6d732 r9 : 84ed7290 r8 : df801a74 r7 : 862f2f00 r6 : df801a74 r5 : 862f2f00 r4 : 00000000 r3 : 00000000 r2 : fffffff0 r1 : 00000000 r0 : df8019dc Flags: nZcv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user Control: 30c5387d Table: 84f52080 DAC: fffffffd Call trace: frame pointer underflow [<807ca3d4>] (selinux_ip_postroute) from [<81721a68>] (nf_hook_entry_hookfn include/linux/netfilter.h:158 [inline]) [<807ca3d4>] (selinux_ip_postroute) from [<81721a68>] (nf_hook_slow+0x44/0x104 net/netfilter/core.c:623) r10:81e6d732 r9:84ed7290 r8:df801a74 r7:862f2f00 r6:84ed7280 r5:00000002 r4:00000001 [<81721a24>] (nf_hook_slow) from [<817bdd08>] (nf_hook include/linux/netfilter.h:273 [inline]) [<81721a24>] (nf_hook_slow) from [<817bdd08>] (NF_HOOK_COND include/linux/netfilter.h:306 [inline]) [<81721a24>] (nf_hook_slow) from [<817bdd08>] (ip_output+0xe4/0x104 net/ipv4/ip_output.c:438) r10:86317780 r9:86317794 r8:8612a000 r7:00000000 r6:00000000 r5:85e9d140 r4:862f2f00 r3:00000000 [<817bdc24>] (ip_output) from [<817bf2c4>] (dst_output include/net/dst.h:470 [inline]) [<817bdc24>] (ip_output) from [<817bf2c4>] (ip_local_out+0x40/0x44 net/ipv4/ip_output.c:131) r8:df801b60 r7:87120e01 r6:00000000 r5:85e9d140 r4:862f2f00 [<817bf284>] (ip_local_out) from [<81758290>] (synproxy_send_tcp+0x120/0x18c net/netfilter/nf_synproxy_core.c:440) r7:87120e01 r6:85e9d140 r5:886b5700 r4:862f2f00 [<81758170>] (synproxy_send_tcp) from [<81758b74>] (synproxy_send_client_synack+0x1a0/0x1f8 net/netfilter/nf_synproxy_core.c:485) r7:862d70c0 r6:862fde54 r5:00000005 r4:862f2f00 [<817589d4>] (synproxy_send_client_synack) from [<81794118>] (nft_synproxy_eval_v4 net/netfilter/nft_synproxy.c:60 [inline]) [<817589d4>] (synproxy_send_client_synack) from [<81794118>] (nft_synproxy_do_eval+0x2bc/0x37c net/netfilter/nft_synproxy.c:142) r10:81e73280 r9:86317794 r8:85cc5e00 r7:8687f498 r6:df801c2c r5:85e9d140 r4:862d70c0 [<81793e5c>] (nft_synproxy_do_eval) from [<81794204>] (nft_synproxy_eval+0x14/0x18 net/netfilter/nft_synproxy.c:248) r9:8687f488 r8:81e73540 r7:81e7323c r6:8687f4a0 r5:81e73394 r4:8687f490 [<817941f0>] (nft_synproxy_eval) from [<8175bba4>] (expr_call_ops_eval net/netfilter/nf_tables_core.c:237 [inline]) [<817941f0>] (nft_synproxy_eval) from [<8175bba4>] (nft_do_chain+0x130/0x57c net/netfilter/nf_tables_core.c:285) [<8175ba74>] (nft_do_chain) from [<81775b2c>] (nft_do_chain_inet+0x54/0x124 net/netfilter/nft_chain_filter.c:161) r10:81e6d732 r9:87b69720 r8:df801d2c r7:862d70c0 r6:87b69700 r5:00000004 r4:830ec400 [<81775ad8>] (nft_do_chain_inet) from [<81721a68>] (nf_hook_entry_hookfn include/linux/netfilter.h:158 [inline]) [<81775ad8>] (nft_do_chain_inet) from [<81721a68>] (nf_hook_slow+0x44/0x104 net/netfilter/core.c:623) r4:00000001 [<81721a24>] (nf_hook_slow) from [<817b8c18>] (nf_hook include/linux/netfilter.h:273 [inline]) [<81721a24>] (nf_hook_slow) from [<817b8c18>] (NF_HOOK include/linux/netfilter.h:316 [inline]) [<81721a24>] (nf_hook_slow) from [<817b8c18>] (ip_local_deliver+0xcc/0x10c net/ipv4/ip_input.c:262) r10:dddd2360 r9:dddd2248 r8:00000040 r7:00000000 r6:85e9d140 r5:8612a000 r4:862d70c0 r3:00000000 [<817b8b4c>] (ip_local_deliver) from [<817b7cd8>] (dst_input include/net/dst.h:480 [inline]) [<817b8b4c>] (ip_local_deliver) from [<817b7cd8>] (ip_rcv_finish+0x98/0xb0 net/ipv4/ip_input.c:453) r6:8612a000 r5:85e9d140 r4:862d70c0 [<817b7c40>] (ip_rcv_finish) from [<817b8ca8>] (NF_HOOK include/linux/netfilter.h:318 [inline]) [<817b7c40>] (ip_rcv_finish) from [<817b8ca8>] (NF_HOOK include/linux/netfilter.h:312 [inline]) [<817b7c40>] (ip_rcv_finish) from [<817b8ca8>] (ip_rcv+0x50/0xec net/ipv4/ip_input.c:573) r7:00000000 r6:85e9d140 r5:8612a000 r4:862d70c0 [<817b8c58>] (ip_rcv) from [<815fe624>] (__netif_receive_skb_one_core+0x60/0x84 net/core/dev.c:6164) r6:00000000 r5:817b8c58 r4:8612a000 [<815fe5c4>] (__netif_receive_skb_one_core) from [<815fe690>] (__netif_receive_skb+0x18/0x5c net/core/dev.c:6277) r5:0000000e r4:862d70c0 [<815fe678>] (__netif_receive_skb) from [<815fe9ec>] (process_backlog+0xa0/0x17c net/core/dev.c:6628) r5:0000000e r4:862d70c0 [<815fe94c>] (process_backlog) from [<815ff1e0>] (__napi_poll+0x34/0x270 net/core/dev.c:7692) r10:df801ea0 r9:00000000 r8:0000012c r7:00000040 r6:df801e9b r5:dddd2360 r4:00000001 [<815ff1ac>] (__napi_poll) from [<815ff778>] (napi_poll net/core/dev.c:7755 [inline]) [<815ff1ac>] (__napi_poll) from [<815ff778>] (net_rx_action+0x35c/0x3e8 net/core/dev.c:7912) r9:00000000 r8:0000012c r7:dddd2360 r6:dddd2364 r5:dddd2240 r4:ffffffff [<815ff41c>] (net_rx_action) from [<8025a1a4>] (handle_softirqs+0x15c/0x4ec kernel/softirq.c:622) r10:00000101 r9:84754980 r8:0000000c r7:00000003 r6:00000002 r5:00000022 r4:8280408c [<8025a048>] (handle_softirqs) from [<8025a6d0>] (__do_softirq kernel/softirq.c:656 [inline]) [<8025a048>] (handle_softirqs) from [<8025a6d0>] (invoke_softirq kernel/softirq.c:496 [inline]) [<8025a048>] (handle_softirqs) from [<8025a6d0>] (__irq_exit_rcu+0x150/0x1d0 kernel/softirq.c:723) r10:8295b7e4 r9:84754980 r8:00000000 r7:eb2f5e78 r6:8245615c r5:82490f9c r4:84754980 [<8025a580>] (__irq_exit_rcu) from [<8025aa08>] (irq_exit+0x10/0x18 kernel/softirq.c:751) r5:82490f9c r4:826cbcdc [<8025a9f8>] (irq_exit) from [<81ae4cf0>] (generic_handle_arch_irq+0x7c/0x80 kernel/irq/handle.c:293) [<81ae4c74>] (generic_handle_arch_irq) from [<81ab3db4>] (call_with_stack+0x1c/0x20 arch/arm/lib/call_with_stack.S:40) r9:84754980 r8:00000000 r7:eb2f5eac r6:ffffffff r5:60030113 r4:81af2b40 [<81ab3d98>] (call_with_stack) from [<80200bec>] (__irq_svc+0x8c/0xbc arch/arm/kernel/entry-armv.S:228) Exception stack(0xeb2f5e78 to 0xeb2f5ec0) 5e60: 84704c40 60030113 5e80: 00000000 0000326e 00000001 00000000 8295b748 00000117 00000000 00000000 5ea0: 8295b7e4 eb2f5ed4 eb2f5ed8 eb2f5ec8 80acbd0c 81af2b40 60030113 ffffffff [<81af2b18>] (_raw_spin_unlock_irqrestore) from [<80acbd0c>] (spin_unlock_irqrestore include/linux/spinlock.h:407 [inline]) [<81af2b18>] (_raw_spin_unlock_irqrestore) from [<80acbd0c>] (__uart_port_unlock_irqrestore include/linux/serial_core.h:616 [inline]) [<81af2b18>] (_raw_spin_unlock_irqrestore) from [<80acbd0c>] (pl011_console_device_unlock+0x20/0x24 drivers/tty/serial/amba-pl011.c:2603) [<80acbcec>] (pl011_console_device_unlock) from [<802e6888>] (nbcon_emit_one+0x88/0x100 kernel/printk/nbcon.c:1165) [<802e6800>] (nbcon_emit_one) from [<802e6b08>] (nbcon_kthread_func+0x208/0x2ec kernel/printk/nbcon.c:1271) r6:82ac410c r5:8295b748 r4:84754980 [<802e6900>] (nbcon_kthread_func) from [<8028141c>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:df975b48 r8:84d0d980 r7:8295b748 r6:802e6900 r5:84754980 r4:8482ba00 [<80281300>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2f5fb0 to 0xeb2f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281300 r4:8482ba00