INFO: task kworker/0:0:9 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:0 state:D stack:0 pid:9 tgid:9 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643fc>] (__schedule) from [<81a65390>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a643fc>] (__schedule) from [<81a65390>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:df83dd84 r9:00000002 r8:60000013 r7:829171a0 r6:df83dd8c r5:8320e000 r4:8320e000 [<81a65364>] (schedule) from [<81a65778>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:8320e000 r4:8291719c [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67fd8>] (__mutex_lock.constprop.0) from [<81a68ad0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df83de08 r4:00000000 [<81a68abc>] (__mutex_lock_slowpath) from [<81a68b10>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68ad4>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858c2300 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:8320e000 r7:00000000 r6:83018400 r5:00001000 r4:7f26a000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:df8f7000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85454f8c r4:830ba780 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:85454f8c r4:830ba780 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:8320e000 r8:830ba7ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:830ba780 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:830ba780 r8:80278fec r7:df819e48 r6:830ba800 r5:8320e000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf83dfb0 to 0xdf83dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:830b62c0 INFO: task kworker/0:0:9 is blocked on a mutex likely owned by task kworker/1:26:7035. task:kworker/1:26 state:R running task stack:0 pid:7035 tgid:7035 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643fc>] (__schedule) from [<81a657c4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:84e24800 r8:80200c04 r7:ea48dd54 r6:ffffffff r5:84e24800 r4:00000000 [<81a65784>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea48dd20 to 0xea48dd68) dd20: b90d5000 eadcb000 00000001 80239bf8 7f28a000 00000001 82acb1c4 82aca5a0 dd40: 7f28a000 eadcb000 8280c9b4 ea48dd9c ea48dda0 ea48dd70 80230af0 80239c10 dd60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea48ddc0 r5:ea48de08 r4:ea48ddc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849ba100 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84e24800 r7:00000000 r6:83018600 r5:00001000 r4:7f2ae000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:eaa35000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84f4778c r4:84d64000 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84f4778c r4:84d64000 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84e24800 r8:84d6402c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:84d64000 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84d64000 r8:80278fec r7:ea885e60 r6:8987a680 r5:84e24800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea48dfb0 to 0xea48dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85490cc0 INFO: task kworker/0:2:5490 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:2 state:D stack:0 pid:5490 tgid:5490 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643fc>] (__schedule) from [<81a65390>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a643fc>] (__schedule) from [<81a65390>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:dfa79d84 r9:00000002 r8:60000113 r7:829171a0 r6:dfa79d8c r5:83afec00 r4:83afec00 [<81a65364>] (schedule) from [<81a65778>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:83afec00 r4:8291719c [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67fd8>] (__mutex_lock.constprop.0) from [<81a68ad0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa79e08 r4:00000000 [<81a68abc>] (__mutex_lock_slowpath) from [<81a68b10>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68ad4>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84999ec0 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:83afec00 r7:00000000 r6:83018400 r5:00001000 r4:7f26e000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfb9b000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84f4638c r4:8976d900 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:84f4638c r4:8976d900 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:83afec00 r8:8976d92c r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:8976d900 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8976d900 r8:80278fec r7:df841e60 r6:859a4d80 r5:83afec00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa79fb0 to 0xdfa79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:832ad400 INFO: task kworker/0:2:5490 is blocked on a mutex likely owned by task kworker/1:26:7035. task:kworker/1:26 state:R running task stack:0 pid:7035 tgid:7035 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643fc>] (__schedule) from [<81a657c4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:84e24800 r8:80200c04 r7:ea48dd54 r6:ffffffff r5:84e24800 r4:00000000 [<81a65784>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea48dd20 to 0xea48dd68) dd20: b90d5000 eadcb000 00000001 80239bf8 7f28a000 00000001 82acb1c4 82aca5a0 dd40: 7f28a000 eadcb000 8280c9b4 ea48dd9c ea48dda0 ea48dd70 80230af0 80239c10 dd60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea48ddc0 r5:ea48de08 r4:ea48ddc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849ba100 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84e24800 r7:00000000 r6:83018600 r5:00001000 r4:7f2ae000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:eaa35000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84f4778c r4:84d64000 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84f4778c r4:84d64000 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84e24800 r8:84d6402c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:84d64000 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84d64000 r8:80278fec r7:ea885e60 r6:8987a680 r5:84e24800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea48dfb0 to 0xea48dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85490cc0 INFO: task kworker/0:27:7002 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:27 state:D stack:0 pid:7002 tgid:7002 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643fc>] (__schedule) from [<81a65390>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a643fc>] (__schedule) from [<81a65390>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ea465d84 r9:00000002 r8:60000013 r7:829171a0 r6:ea465d8c r5:89b31800 r4:89b31800 [<81a65364>] (schedule) from [<81a65778>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:89b31800 r4:8291719c [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67fd8>] (__mutex_lock.constprop.0) from [<81a68ad0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea465e08 r4:00000000 [<81a68abc>] (__mutex_lock_slowpath) from [<81a68b10>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68ad4>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8578dc80 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:89b31800 r7:00000000 r6:83018400 r5:00001000 r4:7f282000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:e82e7000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:854eff8c r4:8987ad00 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:854eff8c r4:8987ad00 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:89b31800 r8:8987ad2c r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:8987ad00 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8987ad00 r8:80278fec r7:ea44de60 r6:84d85e80 r5:89b31800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea465fb0 to 0xea465ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:854c2800 INFO: task kworker/0:27:7002 is blocked on a mutex likely owned by task kworker/1:26:7035. task:kworker/1:26 state:R running task stack:0 pid:7035 tgid:7035 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643fc>] (__schedule) from [<81a657c4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:84e24800 r8:80200c04 r7:ea48dd54 r6:ffffffff r5:84e24800 r4:00000000 [<81a65784>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea48dd20 to 0xea48dd68) dd20: b90d5000 eadcb000 00000001 80239bf8 7f28a000 00000001 82acb1c4 82aca5a0 dd40: 7f28a000 eadcb000 8280c9b4 ea48dd9c ea48dda0 ea48dd70 80230af0 80239c10 dd60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea48ddc0 r5:ea48de08 r4:ea48ddc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849ba100 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84e24800 r7:00000000 r6:83018600 r5:00001000 r4:7f2ae000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:eaa35000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84f4778c r4:84d64000 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84f4778c r4:84d64000 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84e24800 r8:84d6402c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:84d64000 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84d64000 r8:80278fec r7:ea885e60 r6:8987a680 r5:84e24800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea48dfb0 to 0xea48dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85490cc0 INFO: task kworker/1:23:7023 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:23 state:D stack:0 pid:7023 tgid:7023 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643fc>] (__schedule) from [<81a65390>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a643fc>] (__schedule) from [<81a65390>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ea885d84 r9:00000002 r8:60000113 r7:829171a0 r6:ea885d8c r5:841d3c00 r4:841d3c00 [<81a65364>] (schedule) from [<81a65778>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:841d3c00 r4:8291719c [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67fd8>] (__mutex_lock.constprop.0) from [<81a68ad0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea885e08 r4:00000000 [<81a68abc>] (__mutex_lock_slowpath) from [<81a68b10>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68ad4>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:83883c40 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:841d3c00 r7:00000000 r6:83018600 r5:00001000 r4:7f270000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfc05000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84ef3b8c r4:8549b580 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84ef3b8c r4:8549b580 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:841d3c00 r8:8549b5ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:8549b580 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8549b580 r8:80278fec r7:ea7ede60 r6:8549b800 r5:841d3c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea885fb0 to 0xea885ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:8575eb80 INFO: task kworker/1:23:7023 is blocked on a mutex likely owned by task kworker/1:26:7035. task:kworker/1:26 state:R running task stack:0 pid:7035 tgid:7035 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643fc>] (__schedule) from [<81a657c4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:84e24800 r8:80200c04 r7:ea48dd54 r6:ffffffff r5:84e24800 r4:00000000 [<81a65784>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea48dd20 to 0xea48dd68) dd20: b90d5000 eadcb000 00000001 80239bf8 7f28a000 00000001 82acb1c4 82aca5a0 dd40: 7f28a000 eadcb000 8280c9b4 ea48dd9c ea48dda0 ea48dd70 80230af0 80239c10 dd60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea48ddc0 r5:ea48de08 r4:ea48ddc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849ba100 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84e24800 r7:00000000 r6:83018600 r5:00001000 r4:7f2ae000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:eaa35000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84f4778c r4:84d64000 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84f4778c r4:84d64000 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84e24800 r8:84d6402c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:84d64000 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84d64000 r8:80278fec r7:ea885e60 r6:8987a680 r5:84e24800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea48dfb0 to 0xea48dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85490cc0 INFO: task kworker/0:30:7029 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:30 state:D stack:0 pid:7029 tgid:7029 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643fc>] (__schedule) from [<81a65390>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a643fc>] (__schedule) from [<81a65390>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ea851d84 r9:00000002 r8:60000113 r7:829171a0 r6:ea851d8c r5:84e20000 r4:84e20000 [<81a65364>] (schedule) from [<81a65778>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:84e20000 r4:8291719c [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67fd8>] (__mutex_lock.constprop.0) from [<81a68ad0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea851e08 r4:00000000 [<81a68abc>] (__mutex_lock_slowpath) from [<81a68b10>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68ad4>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8588c540 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:84e20000 r7:00000000 r6:83018400 r5:00001000 r4:7f26c000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfb11000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:854bdf8c r4:8987a280 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:854bdf8c r4:8987a280 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84e20000 r8:8987a2ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:8987a280 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8987a280 r8:80278fec r7:ea465e60 r6:8987af00 r5:84e20000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea851fb0 to 0xea851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:849a4ac0 INFO: task kworker/0:30:7029 is blocked on a mutex likely owned by task kworker/1:26:7035. task:kworker/1:26 state:R running task stack:0 pid:7035 tgid:7035 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643fc>] (__schedule) from [<81a657c4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:84e24800 r8:80200c04 r7:ea48dd54 r6:ffffffff r5:84e24800 r4:00000000 [<81a65784>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea48dd20 to 0xea48dd68) dd20: b90d5000 eadcb000 00000001 80239bf8 7f28a000 00000001 82acb1c4 82aca5a0 dd40: 7f28a000 eadcb000 8280c9b4 ea48dd9c ea48dda0 ea48dd70 80230af0 80239c10 dd60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea48ddc0 r5:ea48de08 r4:ea48ddc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849ba100 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84e24800 r7:00000000 r6:83018600 r5:00001000 r4:7f2ae000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:eaa35000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84f4778c r4:84d64000 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84f4778c r4:84d64000 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84e24800 r8:84d6402c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:84d64000 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84d64000 r8:80278fec r7:ea885e60 r6:8987a680 r5:84e24800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea48dfb0 to 0xea48dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85490cc0 INFO: task kworker/0:31:7044 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:31 state:D stack:0 pid:7044 tgid:7044 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643fc>] (__schedule) from [<81a65390>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a643fc>] (__schedule) from [<81a65390>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ea949d84 r9:00000002 r8:60000113 r7:829171a0 r6:ea949d8c r5:84e25400 r4:84e25400 [<81a65364>] (schedule) from [<81a65778>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:84e25400 r4:8291719c [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67fd8>] (__mutex_lock.constprop.0) from [<81a68ad0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea949e08 r4:00000000 [<81a68abc>] (__mutex_lock_slowpath) from [<81a68b10>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68ad4>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:896d21c0 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:84e25400 r7:00000000 r6:83018400 r5:00001000 r4:7f272000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfc0d000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:8564638c r4:8987a000 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:8564638c r4:8987a000 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84e25400 r8:8987a02c r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:8987a000 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8987a000 r8:80278fec r7:ea465e60 r6:8987ad80 r5:84e25400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea949fb0 to 0xea949ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85758f00 INFO: task kworker/0:31:7044 is blocked on a mutex likely owned by task kworker/1:26:7035. task:kworker/1:26 state:R running task stack:0 pid:7035 tgid:7035 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643fc>] (__schedule) from [<81a657c4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:84e24800 r8:80200c04 r7:ea48dd54 r6:ffffffff r5:84e24800 r4:00000000 [<81a65784>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea48dd20 to 0xea48dd68) dd20: b90d5000 eadcb000 00000001 80239bf8 7f28a000 00000001 82acb1c4 82aca5a0 dd40: 7f28a000 eadcb000 8280c9b4 ea48dd9c ea48dda0 ea48dd70 80230af0 80239c10 dd60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea48ddc0 r5:ea48de08 r4:ea48ddc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849ba100 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84e24800 r7:00000000 r6:83018600 r5:00001000 r4:7f2ae000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:eaa35000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84f4778c r4:84d64000 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84f4778c r4:84d64000 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84e24800 r8:84d6402c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:84d64000 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84d64000 r8:80278fec r7:ea885e60 r6:8987a680 r5:84e24800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea48dfb0 to 0xea48dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85490cc0 INFO: task kworker/1:27:7057 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:27 state:D stack:0 pid:7057 tgid:7057 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643fc>] (__schedule) from [<81a65390>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a643fc>] (__schedule) from [<81a65390>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ea9f9d84 r9:00000002 r8:60000013 r7:829171a0 r6:ea9f9d8c r5:898fb000 r4:898fb000 [<81a65364>] (schedule) from [<81a65778>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:898fb000 r4:8291719c [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67fd8>] (__mutex_lock.constprop.0) from [<81a68ad0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9f9e08 r4:00000000 [<81a68abc>] (__mutex_lock_slowpath) from [<81a68b10>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68ad4>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:83883a40 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:898fb000 r7:00000000 r6:83018600 r5:00001000 r4:7f278000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:e0101000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84b0078c r4:84d64480 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84b0078c r4:84d64480 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:898fb000 r8:84d644ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:84d64480 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84d64480 r8:80278fec r7:ea885e60 r6:84d64380 r5:898fb000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9f9fb0 to 0xea9f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:8588ca00 INFO: task kworker/1:27:7057 is blocked on a mutex likely owned by task kworker/1:26:7035. task:kworker/1:26 state:R running task stack:0 pid:7035 tgid:7035 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643fc>] (__schedule) from [<81a657c4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:84e24800 r8:80200c04 r7:ea48dd54 r6:ffffffff r5:84e24800 r4:00000000 [<81a65784>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea48dd20 to 0xea48dd68) dd20: b90d5000 eadcb000 00000001 80239bf8 7f28a000 00000001 82acb1c4 82aca5a0 dd40: 7f28a000 eadcb000 8280c9b4 ea48dd9c ea48dda0 ea48dd70 80230af0 80239c10 dd60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea48ddc0 r5:ea48de08 r4:ea48ddc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849ba100 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84e24800 r7:00000000 r6:83018600 r5:00001000 r4:7f2ae000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:eaa35000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84f4778c r4:84d64000 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84f4778c r4:84d64000 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84e24800 r8:84d6402c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:84d64000 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84d64000 r8:80278fec r7:ea885e60 r6:8987a680 r5:84e24800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea48dfb0 to 0xea48dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85490cc0 INFO: task kworker/1:28:7063 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:28 state:D stack:0 pid:7063 tgid:7063 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643fc>] (__schedule) from [<81a65390>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a643fc>] (__schedule) from [<81a65390>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:dfb15d84 r9:00000002 r8:60000113 r7:829171a0 r6:dfb15d8c r5:898fa400 r4:898fa400 [<81a65364>] (schedule) from [<81a65778>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:898fa400 r4:8291719c [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67fd8>] (__mutex_lock.constprop.0) from [<81a68ad0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb15e08 r4:00000000 [<81a68abc>] (__mutex_lock_slowpath) from [<81a68b10>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68ad4>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8588e540 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:898fa400 r7:00000000 r6:83018600 r5:00001000 r4:7f274000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfc49000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:8564438c r4:8570d600 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:8564438c r4:8570d600 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:898fa400 r8:8570d62c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:8570d600 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8570d600 r8:80278fec r7:ea885e60 r6:8570d080 r5:898fa400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb15fb0 to 0xdfb15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:84fa8400 INFO: task kworker/1:28:7063 is blocked on a mutex likely owned by task kworker/1:26:7035. task:kworker/1:26 state:R running task stack:0 pid:7035 tgid:7035 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643fc>] (__schedule) from [<81a657c4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:84e24800 r8:80200c04 r7:ea48dd54 r6:ffffffff r5:84e24800 r4:00000000 [<81a65784>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea48dd20 to 0xea48dd68) dd20: b90d5000 eadcb000 00000001 80239bf8 7f28a000 00000001 82acb1c4 82aca5a0 dd40: 7f28a000 eadcb000 8280c9b4 ea48dd9c ea48dda0 ea48dd70 80230af0 80239c10 dd60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea48ddc0 r5:ea48de08 r4:ea48ddc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849ba100 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84e24800 r7:00000000 r6:83018600 r5:00001000 r4:7f2ae000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:eaa35000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84f4778c r4:84d64000 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84f4778c r4:84d64000 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84e24800 r8:84d6402c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:84d64000 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84d64000 r8:80278fec r7:ea885e60 r6:8987a680 r5:84e24800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea48dfb0 to 0xea48dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85490cc0 INFO: task kworker/1:29:7075 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:29 state:D stack:0 pid:7075 tgid:7075 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643fc>] (__schedule) from [<81a65390>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a643fc>] (__schedule) from [<81a65390>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:dfc51d84 r9:00000002 r8:60000013 r7:829171a0 r6:dfc51d8c r5:898fe000 r4:898fe000 [<81a65364>] (schedule) from [<81a65778>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:898fe000 r4:8291719c [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67fd8>] (__mutex_lock.constprop.0) from [<81a68ad0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc51e08 r4:00000000 [<81a68abc>] (__mutex_lock_slowpath) from [<81a68b10>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68ad4>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8579f480 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:898fe000 r7:00000000 r6:83018600 r5:00001000 r4:7f276000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:e0099000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84b0138c r4:8549b680 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84b0138c r4:8549b680 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:898fe000 r8:8549b6ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:8549b680 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8549b680 r8:80278fec r7:ea9f9e60 r6:8549b900 r5:898fe000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc51fb0 to 0xdfc51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:8588e700 INFO: task kworker/1:29:7075 is blocked on a mutex likely owned by task kworker/1:26:7035. task:kworker/1:26 state:R running task stack:0 pid:7035 tgid:7035 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643fc>] (__schedule) from [<81a657c4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:84e24800 r8:80200c04 r7:ea48dd54 r6:ffffffff r5:84e24800 r4:00000000 [<81a65784>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea48dd20 to 0xea48dd68) dd20: b90d5000 eadcb000 00000001 80239bf8 7f28a000 00000001 82acb1c4 82aca5a0 dd40: 7f28a000 eadcb000 8280c9b4 ea48dd9c ea48dda0 ea48dd70 80230af0 80239c10 dd60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea48ddc0 r5:ea48de08 r4:ea48ddc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849ba100 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84e24800 r7:00000000 r6:83018600 r5:00001000 r4:7f2ae000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:eaa35000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84f4778c r4:84d64000 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84f4778c r4:84d64000 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84e24800 r8:84d6402c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:84d64000 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84d64000 r8:80278fec r7:ea885e60 r6:8987a680 r5:84e24800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea48dfb0 to 0xea48dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85490cc0 INFO: task kworker/1:30:7085 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:30 state:D stack:0 pid:7085 tgid:7085 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643fc>] (__schedule) from [<81a65390>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a643fc>] (__schedule) from [<81a65390>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:e00f9d84 r9:00000002 r8:60000013 r7:829171a0 r6:e00f9d8c r5:898fec00 r4:898fec00 [<81a65364>] (schedule) from [<81a65778>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:898fec00 r4:8291719c [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67fd8>] (__mutex_lock.constprop.0) from [<81a68ad0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00f9e08 r4:00000000 [<81a68abc>] (__mutex_lock_slowpath) from [<81a68b10>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68ad4>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ca3f00 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:898fec00 r7:00000000 r6:83018600 r5:00001000 r4:7f27a000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:e01af000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84b01b8c r4:84cb8d80 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84b01b8c r4:84cb8d80 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:898fec00 r8:84cb8dac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:84cb8d80 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84cb8d80 r8:80278fec r7:ea9f9e60 r6:84cb8e00 r5:898fec00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00f9fb0 to 0xe00f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:857a8540 INFO: task kworker/1:30:7085 is blocked on a mutex likely owned by task kworker/1:26:7035. task:kworker/1:26 state:R running task stack:0 pid:7035 tgid:7035 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643fc>] (__schedule) from [<81a657c4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:84e24800 r8:80200c04 r7:ea48dd54 r6:ffffffff r5:84e24800 r4:00000000 [<81a65784>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea48dd20 to 0xea48dd68) dd20: b90d5000 eadcb000 00000001 80239bf8 7f28a000 00000001 82acb1c4 82aca5a0 dd40: 7f28a000 eadcb000 8280c9b4 ea48dd9c ea48dda0 ea48dd70 80230af0 80239c10 dd60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea48ddc0 r5:ea48de08 r4:ea48ddc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849ba100 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84e24800 r7:00000000 r6:83018600 r5:00001000 r4:7f2ae000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:eaa35000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84f4778c r4:84d64000 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84f4778c r4:84d64000 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84e24800 r8:84d6402c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:84d64000 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84d64000 r8:80278fec r7:ea885e60 r6:8987a680 r5:84e24800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea48dfb0 to 0xea48dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85490cc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:31:7087 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:31 state:D stack:0 pid:7087 tgid:7087 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643fc>] (__schedule) from [<81a65390>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a643fc>] (__schedule) from [<81a65390>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:e0085d84 r9:00000002 r8:60000113 r7:829171a0 r6:e0085d8c r5:898fbc00 r4:898fbc00 [<81a65364>] (schedule) from [<81a65778>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:898fbc00 r4:8291719c [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67fd8>] (__mutex_lock.constprop.0) from [<81a68ad0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0085e08 r4:00000000 [<81a68abc>] (__mutex_lock_slowpath) from [<81a68b10>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68ad4>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859a9a80 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:898fbc00 r7:00000000 r6:83018600 r5:00001000 r4:7f280000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:e82c3000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84ef378c r4:84cb8a80 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84ef378c r4:84cb8a80 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:898fbc00 r8:84cb8aac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:84cb8a80 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84cb8a80 r8:80278fec r7:e00f9e60 r6:84cb8380 r5:898fbc00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0085fb0 to 0xe0085ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:858636c0 INFO: task kworker/1:31:7087 is blocked on a mutex likely owned by task kworker/1:26:7035. task:kworker/1:26 state:R running task stack:0 pid:7035 tgid:7035 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643fc>] (__schedule) from [<81a657c4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:84e24800 r8:80200c04 r7:ea48dd54 r6:ffffffff r5:84e24800 r4:00000000 [<81a65784>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea48dd20 to 0xea48dd68) dd20: b90d5000 eadcb000 00000001 80239bf8 7f28a000 00000001 82acb1c4 82aca5a0 dd40: 7f28a000 eadcb000 8280c9b4 ea48dd9c ea48dda0 ea48dd70 80230af0 80239c10 dd60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea48ddc0 r5:ea48de08 r4:ea48ddc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849ba100 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84e24800 r7:00000000 r6:83018600 r5:00001000 r4:7f2ae000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:eaa35000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84f4778c r4:84d64000 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84f4778c r4:84d64000 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84e24800 r8:84d6402c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:84d64000 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84d64000 r8:80278fec r7:ea885e60 r6:8987a680 r5:84e24800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea48dfb0 to 0xea48dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85490cc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:32:7095 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:32 state:D stack:0 pid:7095 tgid:7095 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643fc>] (__schedule) from [<81a65390>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a643fc>] (__schedule) from [<81a65390>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:dfc1dd84 r9:00000002 r8:60000113 r7:829171a0 r6:dfc1dd8c r5:83afc800 r4:83afc800 [<81a65364>] (schedule) from [<81a65778>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:83afc800 r4:8291719c [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67fd8>] (__mutex_lock.constprop.0) from [<81a68ad0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc1de08 r4:00000000 [<81a68abc>] (__mutex_lock_slowpath) from [<81a68b10>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68ad4>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ca3100 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:83afc800 r7:00000000 r6:83018600 r5:00001000 r4:7f27c000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:e01b1000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84b0278c r4:84cb8580 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84b0278c r4:84cb8580 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:83afc800 r8:84cb85ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:84cb8580 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84cb8580 r8:80278fec r7:e00f9e60 r6:84cb8000 r5:83afc800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc1dfb0 to 0xdfc1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:84ca3d40 INFO: task kworker/1:32:7095 is blocked on a mutex likely owned by task kworker/1:26:7035. task:kworker/1:26 state:R running task stack:0 pid:7035 tgid:7035 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643fc>] (__schedule) from [<81a657c4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:84e24800 r8:80200c04 r7:ea48dd54 r6:ffffffff r5:84e24800 r4:00000000 [<81a65784>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea48dd20 to 0xea48dd68) dd20: b90d5000 eadcb000 00000001 80239bf8 7f28a000 00000001 82acb1c4 82aca5a0 dd40: 7f28a000 eadcb000 8280c9b4 ea48dd9c ea48dda0 ea48dd70 80230af0 80239c10 dd60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea48ddc0 r5:ea48de08 r4:ea48ddc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849ba100 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84e24800 r7:00000000 r6:83018600 r5:00001000 r4:7f2ae000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:eaa35000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84f4778c r4:84d64000 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84f4778c r4:84d64000 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84e24800 r8:84d6402c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:84d64000 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84d64000 r8:80278fec r7:ea885e60 r6:8987a680 r5:84e24800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea48dfb0 to 0xea48dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85490cc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:32:7096 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:32 state:D stack:0 pid:7096 tgid:7096 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643fc>] (__schedule) from [<81a65390>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a643fc>] (__schedule) from [<81a65390>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ea9b9d84 r9:00000002 r8:60000013 r7:829171a0 r6:ea9b9d8c r5:84e22400 r4:84e22400 [<81a65364>] (schedule) from [<81a65778>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:84e22400 r4:8291719c [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67fd8>] (__mutex_lock.constprop.0) from [<81a68ad0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9b9e08 r4:00000000 [<81a68abc>] (__mutex_lock_slowpath) from [<81a68b10>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68ad4>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8586f380 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:84e22400 r7:00000000 r6:83018400 r5:00001000 r4:7f27e000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:e4229000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84b02f8c r4:8987af80 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:84b02f8c r4:8987af80 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84e22400 r8:8987afac r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:8987af80 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8987af80 r8:80278fec r7:ea465e60 r6:8987ac00 r5:84e22400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9b9fb0 to 0xea9b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:857a6780 INFO: task kworker/0:32:7096 is blocked on a mutex likely owned by task kworker/1:26:7035. task:kworker/1:26 state:R running task stack:0 pid:7035 tgid:7035 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643fc>] (__schedule) from [<81a657c4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:84e24800 r8:80200c04 r7:ea48dd54 r6:ffffffff r5:84e24800 r4:00000000 [<81a65784>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea48dd20 to 0xea48dd68) dd20: b90d5000 eadcb000 00000001 80239bf8 7f28a000 00000001 82acb1c4 82aca5a0 dd40: 7f28a000 eadcb000 8280c9b4 ea48dd9c ea48dda0 ea48dd70 80230af0 80239c10 dd60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea48ddc0 r5:ea48de08 r4:ea48ddc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849ba100 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84e24800 r7:00000000 r6:83018600 r5:00001000 r4:7f2ae000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:eaa35000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84f4778c r4:84d64000 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84f4778c r4:84d64000 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84e24800 r8:84d6402c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:84d64000 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84d64000 r8:80278fec r7:ea885e60 r6:8987a680 r5:84e24800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea48dfb0 to 0xea48dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85490cc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:33:7098 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:33 state:D stack:0 pid:7098 tgid:7098 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643fc>] (__schedule) from [<81a65390>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a643fc>] (__schedule) from [<81a65390>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:e4231d84 r9:00000002 r8:60000013 r7:829171a0 r6:e4231d8c r5:84e26c00 r4:84e26c00 [<81a65364>] (schedule) from [<81a65778>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:84e26c00 r4:8291719c [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67fd8>] (__mutex_lock.constprop.0) from [<81a68ad0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4231e08 r4:00000000 [<81a68abc>] (__mutex_lock_slowpath) from [<81a68b10>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68ad4>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8972cf40 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84e26c00 r7:00000000 r6:83018600 r5:00001000 r4:7f29a000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea315000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84fcef8c r4:83884300 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84fcef8c r4:83884300 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84e26c00 r8:8388432c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:83884300 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:83884300 r8:80278fec r7:e0085e60 r6:8987a480 r5:84e26c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4231fb0 to 0xe4231ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85863b80 INFO: task kworker/1:33:7098 is blocked on a mutex likely owned by task kworker/1:26:7035. task:kworker/1:26 state:R running task stack:0 pid:7035 tgid:7035 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643fc>] (__schedule) from [<81a657c4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:84e24800 r8:80200c04 r7:ea48dd54 r6:ffffffff r5:84e24800 r4:00000000 [<81a65784>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea48dd20 to 0xea48dd68) dd20: b90d5000 eadcb000 00000001 80239bf8 7f28a000 00000001 82acb1c4 82aca5a0 dd40: 7f28a000 eadcb000 8280c9b4 ea48dd9c ea48dda0 ea48dd70 80230af0 80239c10 dd60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea48ddc0 r5:ea48de08 r4:ea48ddc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849ba100 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84e24800 r7:00000000 r6:83018600 r5:00001000 r4:7f2ae000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:eaa35000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84f4778c r4:84d64000 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84f4778c r4:84d64000 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84e24800 r8:84d6402c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:84d64000 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84d64000 r8:80278fec r7:ea885e60 r6:8987a680 r5:84e24800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea48dfb0 to 0xea48dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85490cc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:33:7103 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:33 state:D stack:0 pid:7103 tgid:7103 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643fc>] (__schedule) from [<81a65390>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a643fc>] (__schedule) from [<81a65390>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:e0151d84 r9:00000002 r8:60010113 r7:829171a0 r6:e0151d8c r5:84e26000 r4:84e26000 [<81a65364>] (schedule) from [<81a65778>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:84e26000 r4:8291719c [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67fd8>] (__mutex_lock.constprop.0) from [<81a68ad0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0151e08 r4:00000000 [<81a68abc>] (__mutex_lock_slowpath) from [<81a68b10>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68ad4>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8589eac0 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:84e26000 r7:00000000 r6:83018400 r5:00001000 r4:7f298000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:e82e9000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:857f1b8c r4:8987a180 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:857f1b8c r4:8987a180 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84e26000 r8:8987a1ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:8987a180 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8987a180 r8:80278fec r7:ea465e60 r6:8987a080 r5:84e26000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0151fb0 to 0xe0151ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:84ca3200 INFO: task kworker/0:33:7103 is blocked on a mutex likely owned by task kworker/1:26:7035. task:kworker/1:26 state:R running task stack:0 pid:7035 tgid:7035 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643fc>] (__schedule) from [<81a657c4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:84e24800 r8:80200c04 r7:ea48dd54 r6:ffffffff r5:84e24800 r4:00000000 [<81a65784>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea48dd20 to 0xea48dd68) dd20: b90d5000 eadcb000 00000001 80239bf8 7f28a000 00000001 82acb1c4 82aca5a0 dd40: 7f28a000 eadcb000 8280c9b4 ea48dd9c ea48dda0 ea48dd70 80230af0 80239c10 dd60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea48ddc0 r5:ea48de08 r4:ea48ddc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849ba100 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84e24800 r7:00000000 r6:83018600 r5:00001000 r4:7f2ae000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:eaa35000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84f4778c r4:84d64000 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84f4778c r4:84d64000 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84e24800 r8:84d6402c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:84d64000 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84d64000 r8:80278fec r7:ea885e60 r6:8987a680 r5:84e24800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea48dfb0 to 0xea48dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85490cc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:34:7111 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:34 state:D stack:0 pid:7111 tgid:7111 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643fc>] (__schedule) from [<81a65390>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a643fc>] (__schedule) from [<81a65390>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:e01c1d84 r9:00000002 r8:60000113 r7:829171a0 r6:e01c1d8c r5:8985ec00 r4:8985ec00 [<81a65364>] (schedule) from [<81a65778>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:8985ec00 r4:8291719c [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67fd8>] (__mutex_lock.constprop.0) from [<81a68ad0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e01c1e08 r4:00000000 [<81a68abc>] (__mutex_lock_slowpath) from [<81a68b10>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68ad4>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:89818040 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:8985ec00 r7:00000000 r6:83018600 r5:00001000 r4:7f29e000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea3ef000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:8545778c r4:83884000 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:8545778c r4:83884000 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:8985ec00 r8:8388402c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:83884000 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:83884000 r8:80278fec r7:e4231e60 r6:83884980 r5:8985ec00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe01c1fb0 to 0xe01c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:849cc380 INFO: task kworker/1:34:7111 is blocked on a mutex likely owned by task kworker/1:26:7035. task:kworker/1:26 state:R running task stack:0 pid:7035 tgid:7035 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643fc>] (__schedule) from [<81a657c4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:84e24800 r8:80200c04 r7:ea48dd54 r6:ffffffff r5:84e24800 r4:00000000 [<81a65784>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea48dd20 to 0xea48dd68) dd20: b90d5000 eadcb000 00000001 80239bf8 7f28a000 00000001 82acb1c4 82aca5a0 dd40: 7f28a000 eadcb000 8280c9b4 ea48dd9c ea48dda0 ea48dd70 80230af0 80239c10 dd60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea48ddc0 r5:ea48de08 r4:ea48ddc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849ba100 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84e24800 r7:00000000 r6:83018600 r5:00001000 r4:7f2ae000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:eaa35000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84f4778c r4:84d64000 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84f4778c r4:84d64000 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84e24800 r8:84d6402c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:84d64000 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84d64000 r8:80278fec r7:ea885e60 r6:8987a680 r5:84e24800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea48dfb0 to 0xea48dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85490cc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:34:7113 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:34 state:D stack:0 pid:7113 tgid:7113 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643fc>] (__schedule) from [<81a65390>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a643fc>] (__schedule) from [<81a65390>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ea325d84 r9:00000002 r8:60000013 r7:829171a0 r6:ea325d8c r5:854e3000 r4:854e3000 [<81a65364>] (schedule) from [<81a65778>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:854e3000 r4:8291719c [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67fd8>] (__mutex_lock.constprop.0) from [<81a68ad0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea325e08 r4:00000000 [<81a68abc>] (__mutex_lock_slowpath) from [<81a68b10>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68ad4>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c9cc0 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:854e3000 r7:00000000 r6:83018400 r5:00001000 r4:7f28a000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea34b000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85457f8c r4:8987a580 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:85457f8c r4:8987a580 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:854e3000 r8:8987a5ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:8987a580 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8987a580 r8:80278fec r7:e0151e60 r6:84cb8d00 r5:854e3000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea325fb0 to 0xea325ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:857a93c0 INFO: task kworker/0:34:7113 is blocked on a mutex likely owned by task kworker/1:26:7035. task:kworker/1:26 state:R running task stack:0 pid:7035 tgid:7035 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643fc>] (__schedule) from [<81a657c4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:84e24800 r8:80200c04 r7:ea48dd54 r6:ffffffff r5:84e24800 r4:00000000 [<81a65784>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea48dd20 to 0xea48dd68) dd20: b90d5000 eadcb000 00000001 80239bf8 7f28a000 00000001 82acb1c4 82aca5a0 dd40: 7f28a000 eadcb000 8280c9b4 ea48dd9c ea48dda0 ea48dd70 80230af0 80239c10 dd60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea48ddc0 r5:ea48de08 r4:ea48ddc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849ba100 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84e24800 r7:00000000 r6:83018600 r5:00001000 r4:7f2ae000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:eaa35000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84f4778c r4:84d64000 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84f4778c r4:84d64000 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84e24800 r8:84d6402c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:84d64000 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84d64000 r8:80278fec r7:ea885e60 r6:8987a680 r5:84e24800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea48dfb0 to 0xea48dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85490cc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:35:7116 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:35 state:D stack:0 pid:7116 tgid:7116 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643fc>] (__schedule) from [<81a65390>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a643fc>] (__schedule) from [<81a65390>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ea471d84 r9:00000002 r8:60000113 r7:829171a0 r6:ea471d8c r5:84e23c00 r4:84e23c00 [<81a65364>] (schedule) from [<81a65778>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:84e23c00 r4:8291719c [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67fd8>] (__mutex_lock.constprop.0) from [<81a68ad0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea471e08 r4:00000000 [<81a68abc>] (__mutex_lock_slowpath) from [<81a68b10>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68ad4>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856ffe80 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84e23c00 r7:00000000 r6:83018600 r5:00001000 r4:7f29c000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea319000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84b00f8c r4:8570da80 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84b00f8c r4:8570da80 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84e23c00 r8:8570daac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:8570da80 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8570da80 r8:80278fec r7:e01c1e60 r6:8987a900 r5:84e23c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea471fb0 to 0xea471ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:856ffc80 INFO: task kworker/1:35:7116 is blocked on a mutex likely owned by task kworker/1:26:7035. task:kworker/1:26 state:R running task stack:0 pid:7035 tgid:7035 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643fc>] (__schedule) from [<81a657c4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:84e24800 r8:80200c04 r7:ea48dd54 r6:ffffffff r5:84e24800 r4:00000000 [<81a65784>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea48dd20 to 0xea48dd68) dd20: b90d5000 eadcb000 00000001 80239bf8 7f28a000 00000001 82acb1c4 82aca5a0 dd40: 7f28a000 eadcb000 8280c9b4 ea48dd9c ea48dda0 ea48dd70 80230af0 80239c10 dd60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea48ddc0 r5:ea48de08 r4:ea48ddc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849ba100 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84e24800 r7:00000000 r6:83018600 r5:00001000 r4:7f2ae000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:eaa35000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84f4778c r4:84d64000 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84f4778c r4:84d64000 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84e24800 r8:84d6402c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:84d64000 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84d64000 r8:80278fec r7:ea885e60 r6:8987a680 r5:84e24800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea48dfb0 to 0xea48dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85490cc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:36:7121 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:36 state:D stack:0 pid:7121 tgid:7121 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643fc>] (__schedule) from [<81a65390>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a643fc>] (__schedule) from [<81a65390>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:df9edd84 r9:00000002 r8:60000113 r7:829171a0 r6:df9edd8c r5:854e6000 r4:854e6000 [<81a65364>] (schedule) from [<81a65778>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:854e6000 r4:8291719c [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67fd8>] (__mutex_lock.constprop.0) from [<81a68ad0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9ede08 r4:00000000 [<81a68abc>] (__mutex_lock_slowpath) from [<81a68b10>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68ad4>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8976bb00 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:854e6000 r7:00000000 r6:83018600 r5:00001000 r4:7f284000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfa2d000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84e1878c r4:84ca7600 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84e1878c r4:84ca7600 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:854e6000 r8:84ca762c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:84ca7600 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84ca7600 r8:80278fec r7:e01c1e60 r6:84ca7280 r5:854e6000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9edfb0 to 0xdf9edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:84fd9c40 INFO: task kworker/1:36:7121 is blocked on a mutex likely owned by task kworker/1:26:7035. task:kworker/1:26 state:R running task stack:0 pid:7035 tgid:7035 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643fc>] (__schedule) from [<81a657c4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:84e24800 r8:80200c04 r7:ea48dd54 r6:ffffffff r5:84e24800 r4:00000000 [<81a65784>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea48dd20 to 0xea48dd68) dd20: b90d5000 eadcb000 00000001 80239bf8 7f28a000 00000001 82acb1c4 82aca5a0 dd40: 7f28a000 eadcb000 8280c9b4 ea48dd9c ea48dda0 ea48dd70 80230af0 80239c10 dd60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea48ddc0 r5:ea48de08 r4:ea48ddc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849ba100 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84e24800 r7:00000000 r6:83018600 r5:00001000 r4:7f2ae000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:eaa35000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84f4778c r4:84d64000 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84f4778c r4:84d64000 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84e24800 r8:84d6402c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:84d64000 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84d64000 r8:80278fec r7:ea885e60 r6:8987a680 r5:84e24800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea48dfb0 to 0xea48dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85490cc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:38:7154 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:38 state:D stack:0 pid:7154 tgid:7154 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643fc>] (__schedule) from [<81a65390>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a643fc>] (__schedule) from [<81a65390>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:e0081d84 r9:00000002 r8:60000113 r7:829171a0 r6:e0081d8c r5:854e4800 r4:854e4800 [<81a65364>] (schedule) from [<81a65778>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:854e4800 r4:8291719c [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67fd8>] (__mutex_lock.constprop.0) from [<81a68ad0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0081e08 r4:00000000 [<81a68abc>] (__mutex_lock_slowpath) from [<81a68b10>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68ad4>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858c22c0 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:854e4800 r7:00000000 r6:83018600 r5:00001000 r4:7f286000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfa73000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:896fd78c r4:8987aa00 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:896fd78c r4:8987aa00 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:854e4800 r8:8987aa2c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:8987aa00 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8987aa00 r8:80278fec r7:dfa3de60 r6:84ca7080 r5:854e4800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0081fb0 to 0xe0081ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:857a3180 INFO: task kworker/1:38:7154 is blocked on a mutex likely owned by task kworker/1:26:7035. task:kworker/1:26 state:R running task stack:0 pid:7035 tgid:7035 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643fc>] (__schedule) from [<81a657c4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:84e24800 r8:80200c04 r7:ea48dd54 r6:ffffffff r5:84e24800 r4:00000000 [<81a65784>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea48dd20 to 0xea48dd68) dd20: b90d5000 eadcb000 00000001 80239bf8 7f28a000 00000001 82acb1c4 82aca5a0 dd40: 7f28a000 eadcb000 8280c9b4 ea48dd9c ea48dda0 ea48dd70 80230af0 80239c10 dd60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea48ddc0 r5:ea48de08 r4:ea48ddc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849ba100 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84e24800 r7:00000000 r6:83018600 r5:00001000 r4:7f2ae000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:eaa35000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84f4778c r4:84d64000 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84f4778c r4:84d64000 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84e24800 r8:84d6402c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:84d64000 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84d64000 r8:80278fec r7:ea885e60 r6:8987a680 r5:84e24800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea48dfb0 to 0xea48dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85490cc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:39:7157 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:39 state:D stack:0 pid:7157 tgid:7157 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643fc>] (__schedule) from [<81a65390>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a643fc>] (__schedule) from [<81a65390>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ea5edd84 r9:00000002 r8:60000113 r7:829171a0 r6:ea5edd8c r5:854e0000 r4:854e0000 [<81a65364>] (schedule) from [<81a65778>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:854e0000 r4:8291719c [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67fd8>] (__mutex_lock.constprop.0) from [<81a68ad0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea5ede08 r4:00000000 [<81a68abc>] (__mutex_lock_slowpath) from [<81a68b10>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68ad4>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857a3640 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:854e0000 r7:00000000 r6:83018600 r5:00001000 r4:7f288000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfa75000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:896fdf8c r4:8987a980 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:896fdf8c r4:8987a980 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:854e0000 r8:8987a9ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:8987a980 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8987a980 r8:80278fec r7:dfa3de60 r6:84ca7c00 r5:854e0000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea5edfb0 to 0xea5edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:857a3740 INFO: task kworker/1:39:7157 is blocked on a mutex likely owned by task kworker/1:26:7035. task:kworker/1:26 state:R running task stack:0 pid:7035 tgid:7035 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643fc>] (__schedule) from [<81a657c4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:84e24800 r8:80200c04 r7:ea48dd54 r6:ffffffff r5:84e24800 r4:00000000 [<81a65784>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea48dd20 to 0xea48dd68) dd20: b90d5000 eadcb000 00000001 80239bf8 7f28a000 00000001 82acb1c4 82aca5a0 dd40: 7f28a000 eadcb000 8280c9b4 ea48dd9c ea48dda0 ea48dd70 80230af0 80239c10 dd60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea48ddc0 r5:ea48de08 r4:ea48ddc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849ba100 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84e24800 r7:00000000 r6:83018600 r5:00001000 r4:7f2ae000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:eaa35000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84f4778c r4:84d64000 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84f4778c r4:84d64000 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84e24800 r8:84d6402c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:84d64000 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84d64000 r8:80278fec r7:ea885e60 r6:8987a680 r5:84e24800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea48dfb0 to 0xea48dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85490cc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:36:7159 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:36 state:D stack:0 pid:7159 tgid:7159 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643fc>] (__schedule) from [<81a65390>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a643fc>] (__schedule) from [<81a65390>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ea349d84 r9:00000002 r8:60000113 r7:829171a0 r6:ea349d8c r5:84e71800 r4:84e71800 [<81a65364>] (schedule) from [<81a65778>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:84e71800 r4:8291719c [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67fd8>] (__mutex_lock.constprop.0) from [<81a68ad0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea349e08 r4:00000000 [<81a68abc>] (__mutex_lock_slowpath) from [<81a68b10>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68ad4>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857a8540 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:84e71800 r7:00000000 r6:83018400 r5:00001000 r4:7f28c000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea377000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:8545738c r4:855c4c80 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:8545738c r4:855c4c80 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84e71800 r8:855c4cac r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:855c4c80 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:855c4c80 r8:80278fec r7:e82a9e60 r6:855c4380 r5:84e71800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea349fb0 to 0xea349ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:857a84c0 INFO: task kworker/0:36:7159 is blocked on a mutex likely owned by task kworker/1:26:7035. task:kworker/1:26 state:R running task stack:0 pid:7035 tgid:7035 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643fc>] (__schedule) from [<81a657c4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:84e24800 r8:80200c04 r7:ea48dd54 r6:ffffffff r5:84e24800 r4:00000000 [<81a65784>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea48dd20 to 0xea48dd68) dd20: b90d5000 eadcb000 00000001 80239bf8 7f28a000 00000001 82acb1c4 82aca5a0 dd40: 7f28a000 eadcb000 8280c9b4 ea48dd9c ea48dda0 ea48dd70 80230af0 80239c10 dd60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea48ddc0 r5:ea48de08 r4:ea48ddc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849ba100 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84e24800 r7:00000000 r6:83018600 r5:00001000 r4:7f2ae000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:eaa35000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84f4778c r4:84d64000 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84f4778c r4:84d64000 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84e24800 r8:84d6402c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:84d64000 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84d64000 r8:80278fec r7:ea885e60 r6:8987a680 r5:84e24800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea48dfb0 to 0xea48dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85490cc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 30 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT Hardware name: ARM-Versatile Express Call trace: [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c arch/arm/kernel/traps.c:257) r7:00000000 r6:00000013 r5:60000093 r4:82252738 [<80201b08>] (show_stack) from [<8021f8f8>] (__dump_stack lib/dump_stack.c:94 [inline]) [<80201b08>] (show_stack) from [<8021f8f8>] (dump_stack_lvl+0x70/0x7c lib/dump_stack.c:120) [<8021f888>] (dump_stack_lvl) from [<8021f91c>] (dump_stack+0x18/0x1c lib/dump_stack.c:129) r5:00000000 r4:00000001 [<8021f904>] (dump_stack) from [<81a4e014>] (nmi_cpu_backtrace+0x160/0x17c lib/nmi_backtrace.c:113) [<81a4deb4>] (nmi_cpu_backtrace) from [<81a4e160>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8 lib/nmi_backtrace.c:62) r7:00000000 r6:8280c690 r5:8281ae34 r4:ffffffff [<81a4e030>] (nmi_trigger_cpumask_backtrace) from [<802304fc>] (arch_trigger_cpumask_backtrace+0x18/0x1c arch/arm/kernel/smp.c:852) r9:8281ba28 r8:8280c810 r7:00018c68 r6:00007d5c r5:82abf7d4 r4:87a0e90c [<802304e4>] (arch_trigger_cpumask_backtrace) from [<8037faf0>] (trigger_all_cpu_backtrace include/linux/nmi.h:160 [inline]) [<802304e4>] (arch_trigger_cpumask_backtrace) from [<8037faf0>] (check_hung_uninterruptible_tasks kernel/hung_task.c:332 [inline]) [<802304e4>] (arch_trigger_cpumask_backtrace) from [<8037faf0>] (watchdog+0x5d0/0x850 kernel/hung_task.c:495) [<8037f520>] (watchdog) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:00000000 r8:8037f520 r7:83329100 r6:83329100 r5:8321e000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf8d9fb0 to 0xdf8d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:832c0ac0 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 2817 Comm: pr/ttyAMA-1 Not tainted syzkaller #0 PREEMPT Hardware name: ARM-Versatile Express PC is at __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:152 [inline] PC is at _raw_spin_unlock_irqrestore+0x28/0x54 kernel/locking/spinlock.c:194 LR is at spin_unlock_irqrestore include/linux/spinlock.h:406 [inline] LR is at __uart_port_unlock_irqrestore include/linux/serial_core.h:616 [inline] LR is at pl011_console_device_unlock+0x20/0x24 drivers/tty/serial/amba-pl011.c:2603 pc : [<81a6e264>] lr : [<80a8f568>] psr: 60000113 sp : eb08deb0 ip : eb08dec0 fp : eb08debc r10: 82959594 r9 : 00000001 r8 : 00000000 r7 : 00000117 r6 : 829594f8 r5 : 00000000 r4 : 00000001 r3 : 00000ed6 r2 : 00000000 r1 : 60000113 r0 : 840fec40 Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none Control: 30c5387d Table: 84947d40 DAC: 00000000 Call trace: [<81a6e23c>] (_raw_spin_unlock_irqrestore) from [<80a8f568>] (spin_unlock_irqrestore include/linux/spinlock.h:406 [inline]) [<81a6e23c>] (_raw_spin_unlock_irqrestore) from [<80a8f568>] (__uart_port_unlock_irqrestore include/linux/serial_core.h:616 [inline]) [<81a6e23c>] (_raw_spin_unlock_irqrestore) from [<80a8f568>] (pl011_console_device_unlock+0x20/0x24 drivers/tty/serial/amba-pl011.c:2603) [<80a8f548>] (pl011_console_device_unlock) from [<802e3750>] (nbcon_emit_one+0x88/0x100 kernel/printk/nbcon.c:1142) [<802e36c8>] (nbcon_emit_one) from [<802e3970>] (nbcon_kthread_func+0x1a8/0x2a4 kernel/printk/nbcon.c:1229) r6:8280c690 r5:841e0c00 r4:829594f8 [<802e37c8>] (nbcon_kthread_func) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:829594f8 r8:802e37c8 r7:844e4d00 r6:844e4d00 r5:841e0c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb08dfb0 to 0xeb08dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:8423e840