INFO: task kworker/1:8:5262 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:8 state:D stack:0 pid:5262 tgid:5262 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643dc>] (__schedule) from [<81a65370>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a643dc>] (__schedule) from [<81a65370>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:e0241d84 r9:00000002 r8:60000113 r7:829171a0 r6:e0241d8c r5:85e1bc00 r4:85e1bc00 [<81a65344>] (schedule) from [<81a65758>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:85e1bc00 r4:8291719c [<81a65740>] (schedule_preempt_disabled) from [<81a68308>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65740>] (schedule_preempt_disabled) from [<81a68308>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67fb8>] (__mutex_lock.constprop.0) from [<81a68ab0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0241e08 r4:00000000 [<81a68a9c>] (__mutex_lock_slowpath) from [<81a68af0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68ab4>] (mutex_lock) from [<804ea30c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8620e900 r4:00000000 [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:85e1bc00 r7:00000000 r6:83018600 r5:00001000 r4:7f24e000 [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfb73000 [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85c88b8c r4:84a9d680 [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:85c88b8c r4:84a9d680 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85e1bc00 r8:84a9d6ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:84a9d680 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84a9d680 r8:80278fec r7:e023de60 r6:84a9dd80 r5:85e1bc00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0241fb0 to 0xe0241ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85e8b240 INFO: task kworker/1:8:5262 is blocked on a mutex likely owned by task kworker/1:42:5697. task:kworker/1:42 state:R running task stack:0 pid:5697 tgid:5697 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<8028d908>] (preempt_count_sub) from [<81a657b0>] (preempt_schedule_irq+0x4c/0xa8 kernel/sched/core.c:7258) [<81a65764>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfb7dd20 to 0xdfb7dd68) dd20: e17cc000 eb895000 00000001 80239bf8 7f045000 00000001 82acb1c4 82aca5a0 dd40: 7f045000 eb895000 8280c9b4 dfb7dd9c dfb7dda0 dfb7dd70 80230af0 80239c10 dd60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0d0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e4c>] (__purge_vmap_area_lazy) from [<804ea488>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfb7ddc0 r5:dfb7de08 r4:dfb7ddc0 [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b5ac00 r4:00000000 [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:85f8c800 r7:00000000 r6:83018600 r5:00001000 r4:7f047000 [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfa5b000 [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85c88f8c r4:84e50b80 [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:85c88f8c r4:84e50b80 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85f8c800 r8:84e50bac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:84e50b80 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84e50b80 r8:80278fec r7:e00c9e60 r6:84b3a580 r5:85f8c800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb7dfb0 to 0xdfb7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85469ec0 INFO: task kworker/0:22:5388 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:22 state:D stack:0 pid:5388 tgid:5388 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643dc>] (__schedule) from [<81a65370>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a643dc>] (__schedule) from [<81a65370>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ea7edd84 r9:00000002 r8:60000113 r7:829171a0 r6:ea7edd8c r5:84160c00 r4:84160c00 [<81a65344>] (schedule) from [<81a65758>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:84160c00 r4:8291719c [<81a65740>] (schedule_preempt_disabled) from [<81a68308>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65740>] (schedule_preempt_disabled) from [<81a68308>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67fb8>] (__mutex_lock.constprop.0) from [<81a68ab0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea7ede08 r4:00000000 [<81a68a9c>] (__mutex_lock_slowpath) from [<81a68af0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68ab4>] (mutex_lock) from [<804ea30c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:861ef240 r4:00000000 [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:84160c00 r7:00000000 r6:83018400 r5:00001000 r4:7f24c000 [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfb1f000 [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85fe238c r4:84aa1480 [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:85fe238c r4:84aa1480 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84160c00 r8:84aa14ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:84aa1480 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84aa1480 r8:80278fec r7:e01e9e60 r6:84aa1500 r5:84160c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea7edfb0 to 0xea7edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:84a79780 INFO: task kworker/0:22:5388 is blocked on a mutex likely owned by task kworker/1:42:5697. task:kworker/1:42 state:R running task stack:0 pid:5697 tgid:5697 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643dc>] (__schedule) from [<81a657a4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:85f8c800 r8:80200c04 r7:dfb7dd54 r6:ffffffff r5:85f8c800 r4:00000000 [<81a65764>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfb7dd20 to 0xdfb7dd68) dd20: e1980000 eb895000 00000001 80239bf8 7f045000 00000001 82acb1c4 82aca5a0 dd40: 7f045000 eb895000 8280c9b4 dfb7dd9c dfb7dda0 dfb7dd70 80230af0 80239c10 dd60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0d0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e4c>] (__purge_vmap_area_lazy) from [<804ea488>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfb7ddc0 r5:dfb7de08 r4:dfb7ddc0 [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b5ac00 r4:00000000 [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:85f8c800 r7:00000000 r6:83018600 r5:00001000 r4:7f047000 [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfa5b000 [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85c88f8c r4:84e50b80 [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:85c88f8c r4:84e50b80 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85f8c800 r8:84e50bac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:84e50b80 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84e50b80 r8:80278fec r7:e00c9e60 r6:84b3a580 r5:85f8c800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb7dfb0 to 0xdfb7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85469ec0 INFO: task kworker/0:23:5391 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:23 state:D stack:0 pid:5391 tgid:5391 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643dc>] (__schedule) from [<81a65370>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a643dc>] (__schedule) from [<81a65370>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ea889d84 r9:00000002 r8:60000113 r7:829171a0 r6:ea889d8c r5:83b5a400 r4:83b5a400 [<81a65344>] (schedule) from [<81a65758>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:83b5a400 r4:8291719c [<81a65740>] (schedule_preempt_disabled) from [<81a68308>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65740>] (schedule_preempt_disabled) from [<81a68308>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67fb8>] (__mutex_lock.constprop.0) from [<81a68ab0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea889e08 r4:00000000 [<81a68a9c>] (__mutex_lock_slowpath) from [<81a68af0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68ab4>] (mutex_lock) from [<804ea30c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8620ef40 r4:00000000 [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:83b5a400 r7:00000000 r6:83018400 r5:00001000 r4:7f252000 [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfc49000 [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85c8bf8c r4:85dd5780 [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:85c8bf8c r4:85dd5780 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:83b5a400 r8:85dd57ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:85dd5780 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85dd5780 r8:80278fec r7:e01e9e60 r6:85dd5400 r5:83b5a400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea889fb0 to 0xea889ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85e8b100 INFO: task kworker/0:23:5391 is blocked on a mutex likely owned by task kworker/1:42:5697. task:kworker/1:42 state:R running task stack:0 pid:5697 tgid:5697 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643dc>] (__schedule) from [<81a657a4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:85f8c800 r8:80200c04 r7:dfb7dd54 r6:ffffffff r5:85f8c800 r4:00000000 [<81a65764>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfb7dd20 to 0xdfb7dd68) dd20: e1c0e000 eb895000 00000001 80239bf8 7f045000 00000001 82acb1c4 82aca5a0 dd40: 7f045000 eb895000 8280c9b4 dfb7dd9c dfb7dda0 dfb7dd70 80230af0 80239c10 dd60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0d0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e4c>] (__purge_vmap_area_lazy) from [<804ea488>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfb7ddc0 r5:dfb7de08 r4:dfb7ddc0 [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b5ac00 r4:00000000 [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:85f8c800 r7:00000000 r6:83018600 r5:00001000 r4:7f047000 [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfa5b000 [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85c88f8c r4:84e50b80 [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:85c88f8c r4:84e50b80 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85f8c800 r8:84e50bac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:84e50b80 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84e50b80 r8:80278fec r7:e00c9e60 r6:84b3a580 r5:85f8c800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb7dfb0 to 0xdfb7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85469ec0 INFO: task kworker/0:25:5406 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:25 state:D stack:0 pid:5406 tgid:5406 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643dc>] (__schedule) from [<81a65370>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a643dc>] (__schedule) from [<81a65370>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ea965d84 r9:00000002 r8:60000013 r7:829171a0 r6:ea965d8c r5:840f4800 r4:840f4800 [<81a65344>] (schedule) from [<81a65758>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:840f4800 r4:8291719c [<81a65740>] (schedule_preempt_disabled) from [<81a68308>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65740>] (schedule_preempt_disabled) from [<81a68308>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67fb8>] (__mutex_lock.constprop.0) from [<81a68ab0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea965e08 r4:00000000 [<81a68a9c>] (__mutex_lock_slowpath) from [<81a68af0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68ab4>] (mutex_lock) from [<804ea30c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:861ec680 r4:00000000 [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:840f4800 r7:00000000 r6:83018400 r5:00001000 r4:7f045000 [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:e0155000 [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:8636e38c r4:857e3000 [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:8636e38c r4:857e3000 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:840f4800 r8:857e302c r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:857e3000 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:857e3000 r8:80278fec r7:ea949e60 r6:857e3180 r5:840f4800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea965fb0 to 0xea965ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:857e27c0 INFO: task kworker/0:25:5406 is blocked on a mutex likely owned by task kworker/1:42:5697. task:kworker/1:42 state:R running task stack:0 pid:5697 tgid:5697 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643dc>] (__schedule) from [<81a657a4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:85f8c800 r8:80200c04 r7:dfb7dd54 r6:ffffffff r5:85f8c800 r4:00000000 [<81a65764>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfb7dd20 to 0xdfb7dd68) dd20: e2967000 eb895000 00000001 80239bf8 7f045000 00000001 82acb1c4 82aca5a0 dd40: 7f045000 eb895000 8280c9b4 dfb7dd9c dfb7dda0 dfb7dd70 80230af0 80239c10 dd60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0d0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e4c>] (__purge_vmap_area_lazy) from [<804ea488>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfb7ddc0 r5:dfb7de08 r4:dfb7ddc0 [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b5ac00 r4:00000000 [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:85f8c800 r7:00000000 r6:83018600 r5:00001000 r4:7f047000 [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfa5b000 [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85c88f8c r4:84e50b80 [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:85c88f8c r4:84e50b80 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85f8c800 r8:84e50bac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:84e50b80 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84e50b80 r8:80278fec r7:e00c9e60 r6:84b3a580 r5:85f8c800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb7dfb0 to 0xdfb7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85469ec0 INFO: task kworker/0:29:5460 blocked for more than 431 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:29 state:D stack:0 pid:5460 tgid:5460 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643dc>] (__schedule) from [<81a65370>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a643dc>] (__schedule) from [<81a65370>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:eab6dd84 r9:00000002 r8:60000113 r7:829171a0 r6:eab6dd8c r5:85e1e000 r4:85e1e000 [<81a65344>] (schedule) from [<81a65758>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:85e1e000 r4:8291719c [<81a65740>] (schedule_preempt_disabled) from [<81a68308>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65740>] (schedule_preempt_disabled) from [<81a68308>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67fb8>] (__mutex_lock.constprop.0) from [<81a68ab0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab6de08 r4:00000000 [<81a68a9c>] (__mutex_lock_slowpath) from [<81a68af0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68ab4>] (mutex_lock) from [<804ea30c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:861efb00 r4:00000000 [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:85e1e000 r7:00000000 r6:83018400 r5:00001000 r4:7f250000 [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfc25000 [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85fb4b8c r4:857e3400 [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:85fb4b8c r4:857e3400 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85e1e000 r8:857e342c r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:857e3400 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:857e3400 r8:80278fec r7:eaab1e60 r6:85b8f680 r5:85e1e000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab6dfb0 to 0xeab6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:86068080 INFO: task kworker/0:29:5460 is blocked on a mutex likely owned by task kworker/1:42:5697. task:kworker/1:42 state:R running task stack:0 pid:5697 tgid:5697 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643dc>] (__schedule) from [<81a657a4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:85f8c800 r8:80200c04 r7:dfb7dd54 r6:ffffffff r5:85f8c800 r4:00000000 [<81a65764>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfb7dd20 to 0xdfb7dd68) dd20: e2e47000 eb895000 00000001 80239bf8 7f045000 00000001 82acb1c4 82aca5a0 dd40: 7f045000 eb895000 8280c9b4 dfb7dd9c dfb7dda0 dfb7dd70 80230af0 80239c10 dd60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0d0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e4c>] (__purge_vmap_area_lazy) from [<804ea488>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfb7ddc0 r5:dfb7de08 r4:dfb7ddc0 [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b5ac00 r4:00000000 [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:85f8c800 r7:00000000 r6:83018600 r5:00001000 r4:7f047000 [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfa5b000 [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85c88f8c r4:84e50b80 [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:85c88f8c r4:84e50b80 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85f8c800 r8:84e50bac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:84e50b80 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84e50b80 r8:80278fec r7:e00c9e60 r6:84b3a580 r5:85f8c800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb7dfb0 to 0xdfb7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85469ec0 INFO: task kworker/1:13:5478 blocked for more than 431 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:13 state:D stack:0 pid:5478 tgid:5478 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643dc>] (__schedule) from [<81a65370>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a643dc>] (__schedule) from [<81a65370>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:dfb85d84 r9:00000002 r8:600e0113 r7:829171a0 r6:dfb85d8c r5:84160000 r4:84160000 [<81a65344>] (schedule) from [<81a65758>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:84160000 r4:8291719c [<81a65740>] (schedule_preempt_disabled) from [<81a68308>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65740>] (schedule_preempt_disabled) from [<81a68308>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67fb8>] (__mutex_lock.constprop.0) from [<81a68ab0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb85e08 r4:00000000 [<81a68a9c>] (__mutex_lock_slowpath) from [<81a68af0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68ab4>] (mutex_lock) from [<804ea30c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8620e180 r4:00000000 [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84160000 r7:00000000 r6:83018600 r5:00001000 r4:7f254000 [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfd6b000 [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85c8bb8c r4:85b8f280 [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:85c8bb8c r4:85b8f280 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84160000 r8:85b8f2ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85b8f280 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85b8f280 r8:80278fec r7:e0241e60 r6:85b8fd00 r5:84160000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb85fb0 to 0xdfb85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:859ccdc0 INFO: task kworker/1:13:5478 is blocked on a mutex likely owned by task kworker/1:42:5697. task:kworker/1:42 state:R running task stack:0 pid:5697 tgid:5697 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643dc>] (__schedule) from [<81a657a4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:85f8c800 r8:80200c04 r7:dfb7dd54 r6:ffffffff r5:85f8c800 r4:00000000 [<81a65764>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfb7dd20 to 0xdfb7dd68) dd20: e33c1000 eb895000 00000001 80239bf8 7f045000 00000001 82acb1c4 82aca5a0 dd40: 7f045000 eb895000 8280c9b4 dfb7dd9c dfb7dda0 dfb7dd70 80230af0 80239c10 dd60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0d0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e4c>] (__purge_vmap_area_lazy) from [<804ea488>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfb7ddc0 r5:dfb7de08 r4:dfb7ddc0 [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b5ac00 r4:00000000 [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:85f8c800 r7:00000000 r6:83018600 r5:00001000 r4:7f047000 [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfa5b000 [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85c88f8c r4:84e50b80 [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:85c88f8c r4:84e50b80 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85f8c800 r8:84e50bac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:84e50b80 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84e50b80 r8:80278fec r7:e00c9e60 r6:84b3a580 r5:85f8c800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb7dfb0 to 0xdfb7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85469ec0 INFO: task kworker/1:17:5520 blocked for more than 432 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:17 state:D stack:0 pid:5520 tgid:5520 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643dc>] (__schedule) from [<81a65370>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a643dc>] (__schedule) from [<81a65370>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:dfc59d84 r9:00000002 r8:60000113 r7:829171a0 r6:dfc59d8c r5:85f84800 r4:85f84800 [<81a65344>] (schedule) from [<81a65758>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:85f84800 r4:8291719c [<81a65740>] (schedule_preempt_disabled) from [<81a68308>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65740>] (schedule_preempt_disabled) from [<81a68308>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67fb8>] (__mutex_lock.constprop.0) from [<81a68ab0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc59e08 r4:00000000 [<81a68a9c>] (__mutex_lock_slowpath) from [<81a68af0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68ab4>] (mutex_lock) from [<804ea30c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:860e3a40 r4:00000000 [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:85f84800 r7:00000000 r6:83018600 r5:00001000 r4:7f256000 [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:e00db000 [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85c8938c r4:85b8f880 [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:85c8938c r4:85b8f880 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85f84800 r8:85b8f8ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85b8f880 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85b8f880 r8:80278fec r7:dfad5e60 r6:85b8f200 r5:85f84800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc59fb0 to 0xdfc59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:84e53600 INFO: task kworker/1:17:5520 is blocked on a mutex likely owned by task kworker/1:42:5697. task:kworker/1:42 state:R running task stack:0 pid:5697 tgid:5697 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643dc>] (__schedule) from [<81a657a4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:85f8c800 r8:80200c04 r7:dfb7dd54 r6:ffffffff r5:85f8c800 r4:00000000 [<81a65764>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfb7dd20 to 0xdfb7dd68) dd20: e368e000 eb895000 00000001 80239bf8 7f045000 00000001 82acb1c4 82aca5a0 dd40: 7f045000 eb895000 8280c9b4 dfb7dd9c dfb7dda0 dfb7dd70 80230af0 80239c10 dd60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0d0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e4c>] (__purge_vmap_area_lazy) from [<804ea488>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfb7ddc0 r5:dfb7de08 r4:dfb7ddc0 [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b5ac00 r4:00000000 [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:85f8c800 r7:00000000 r6:83018600 r5:00001000 r4:7f047000 [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfa5b000 [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85c88f8c r4:84e50b80 [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:85c88f8c r4:84e50b80 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85f8c800 r8:84e50bac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:84e50b80 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84e50b80 r8:80278fec r7:e00c9e60 r6:84b3a580 r5:85f8c800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb7dfb0 to 0xdfb7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85469ec0 NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 30 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT Hardware name: ARM-Versatile Express Call trace: [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c arch/arm/kernel/traps.c:257) r7:00000000 r6:00000113 r5:60000193 r4:82252738 [<80201b08>] (show_stack) from [<8021f8f8>] (__dump_stack lib/dump_stack.c:94 [inline]) [<80201b08>] (show_stack) from [<8021f8f8>] (dump_stack_lvl+0x70/0x7c lib/dump_stack.c:120) [<8021f888>] (dump_stack_lvl) from [<8021f91c>] (dump_stack+0x18/0x1c lib/dump_stack.c:129) r5:00000000 r4:00000001 [<8021f904>] (dump_stack) from [<81a4dff4>] (nmi_cpu_backtrace+0x160/0x17c lib/nmi_backtrace.c:113) [<81a4de94>] (nmi_cpu_backtrace) from [<81a4e140>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8 lib/nmi_backtrace.c:62) r7:00000000 r6:8280c690 r5:8281ae34 r4:ffffffff [<81a4e010>] (nmi_trigger_cpumask_backtrace) from [<802304fc>] (arch_trigger_cpumask_backtrace+0x18/0x1c arch/arm/kernel/smp.c:852) r9:8281ba28 r8:8280c810 r7:00011e32 r6:00007d2b r5:82abf7d4 r4:8480630c [<802304e4>] (arch_trigger_cpumask_backtrace) from [<8037faf8>] (trigger_all_cpu_backtrace include/linux/nmi.h:160 [inline]) [<802304e4>] (arch_trigger_cpumask_backtrace) from [<8037faf8>] (check_hung_uninterruptible_tasks kernel/hung_task.c:332 [inline]) [<802304e4>] (arch_trigger_cpumask_backtrace) from [<8037faf8>] (watchdog+0x5d0/0x850 kernel/hung_task.c:495) [<8037f528>] (watchdog) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:00000000 r8:8037f528 r7:830d6500 r6:830d6500 r5:8321d400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf8d9fb0 to 0xdf8d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:833d82c0 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 5697 Comm: kworker/1:42 Not tainted syzkaller #0 PREEMPT Hardware name: ARM-Versatile Express Workqueue: events bpf_prog_free_deferred PC is at v7wbi_flush_kern_tlb_range+0x18/0x48 arch/arm/mm/tlb-v7.S:84 LR is at flush_tlb_kernel_range+0x64/0xb8 arch/arm/kernel/smp_tlb.c:243 pc : [<80239c10>] lr : [<80230af0>] psr: 80000013 sp : dfb7dd70 ip : dfb7dda0 fp : dfb7dd9c r10: 8280c9b4 r9 : eb895000 r8 : 7f045000 r7 : 82aca5a0 r6 : 82acb1c4 r5 : 00000001 r4 : 7f045000 r3 : 80239bf8 r2 : 00000001 r1 : eb895000 r0 : e369b000 Flags: Nzcv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none Control: 30c5387d Table: 868f29c0 DAC: 00000000 Call trace: [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0d0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e4c>] (__purge_vmap_area_lazy) from [<804ea488>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfb7ddc0 r5:dfb7de08 r4:dfb7ddc0 [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b5ac00 r4:00000000 [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:85f8c800 r7:00000000 r6:83018600 r5:00001000 r4:7f047000 [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfa5b000 [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85c88f8c r4:84e50b80 [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:85c88f8c r4:84e50b80 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85f8c800 r8:84e50bac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:84e50b80 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84e50b80 r8:80278fec r7:e00c9e60 r6:84b3a580 r5:85f8c800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb7dfb0 to 0xdfb7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85469ec0