INFO: task kworker/1:4:3048 blocked for more than 436 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:4 state:D stack:0 pid:3048 tgid:3048 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a399b4>] (__schedule) from [<81a3a948>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a399b4>] (__schedule) from [<81a3a948>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ec2a1d84 r9:00000002 r8:60000113 r7:82917120 r6:ec2a1d8c r5:839a9800 r4:839a9800 [<81a3a91c>] (schedule) from [<81a3ad30>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:839a9800 r4:8291711c [<81a3ad18>] (schedule_preempt_disabled) from [<81a3d8e0>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3ad18>] (schedule_preempt_disabled) from [<81a3d8e0>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a3d590>] (__mutex_lock.constprop.0) from [<81a3e088>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec2a1e08 r4:00000000 [<81a3e074>] (__mutex_lock_slowpath) from [<81a3e0c8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a3e08c>] (mutex_lock) from [<804e97d8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804e9770>] (_vm_unmap_aliases) from [<804ed5b8>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9770>] (_vm_unmap_aliases) from [<804ed5b8>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b68600 r4:00000000 [<804ed44c>] (vfree) from [<805581b8>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:839a9800 r7:00000000 r6:83018600 r5:00001000 r4:7f089000 [<80558188>] (execmem_free) from [<803c57d0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dff29000 [<803c57c0>] (bpf_jit_free_exec) from [<803c5bb0>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c57c0>] (bpf_jit_free_exec) from [<803c5bb0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c5b48>] (bpf_jit_free) from [<803c6c58>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:8559cb8c r4:854e8300 [<803c6b18>] (bpf_prog_free_deferred) from [<80278594>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:8559cb8c r4:854e8300 [<802783e0>] (process_one_work) from [<802791dc>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783e0>] (process_one_work) from [<802791dc>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:839a9800 r8:854e832c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:854e8300 [<80278fe0>] (worker_thread) from [<80280200>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:854e8300 r8:80278fe0 r7:df921e60 r6:854e8380 r5:839a9800 r4:00000001 [<802800d4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec2a1fb0 to 0xec2a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800d4 r4:854ec440 INFO: task kworker/1:4:3048 is blocked on a mutex likely owned by task kworker/0:0:9. task:kworker/0:0 state:R running task stack:0 pid:9 tgid:9 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a399b4>] (__schedule) from [<81a3ad7c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:8320e000 r8:80200c04 r7:df83dd54 r6:ffffffff r5:8320e000 r4:00000000 [<81a3ad3c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdf83dd20 to 0xdf83dd68) dd20: d6f4a000 e874f000 00000001 80239bf8 7f083000 00000001 82aca1c4 82ac95a0 dd40: 7f083000 e874f000 8280c9b4 df83dd9c df83dda0 df83dd70 80230af0 80239c10 dd60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804e959c>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82aca1e4 [<804e9318>] (__purge_vmap_area_lazy) from [<804e9954>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df83ddc0 r5:df83de08 r4:df83ddc0 [<804e9770>] (_vm_unmap_aliases) from [<804ed5b8>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9770>] (_vm_unmap_aliases) from [<804ed5b8>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f34c00 r4:00000000 [<804ed44c>] (vfree) from [<805581b8>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:8320e000 r7:00000000 r6:83018400 r5:00001000 r4:7f073000 [<80558188>] (execmem_free) from [<803c57d0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:df959000 [<803c57c0>] (bpf_jit_free_exec) from [<803c5bb0>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c57c0>] (bpf_jit_free_exec) from [<803c5bb0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c5b48>] (bpf_jit_free) from [<803c6c58>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:87e7178c r4:830b9380 [<803c6b18>] (bpf_prog_free_deferred) from [<80278594>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:87e7178c r4:830b9380 [<802783e0>] (process_one_work) from [<802791dc>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783e0>] (process_one_work) from [<802791dc>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:8320e000 r8:830b93ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:830b9380 [<80278fe0>] (worker_thread) from [<80280200>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:830b9380 r8:80278fe0 r7:df819e48 r6:830b9400 r5:8320e000 r4:00000001 [<802800d4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf83dfb0 to 0xdf83dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800d4 r4:830b6340 INFO: task kworker/0:4:3783 blocked for more than 446 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:4 state:D stack:0 pid:3783 tgid:3783 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a399b4>] (__schedule) from [<81a3a948>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a399b4>] (__schedule) from [<81a3a948>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:dfde9d84 r9:00000002 r8:600b0013 r7:82917120 r6:dfde9d8c r5:839c2400 r4:839c2400 [<81a3a91c>] (schedule) from [<81a3ad30>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:839c2400 r4:8291711c [<81a3ad18>] (schedule_preempt_disabled) from [<81a3d8e0>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3ad18>] (schedule_preempt_disabled) from [<81a3d8e0>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a3d590>] (__mutex_lock.constprop.0) from [<81a3e088>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfde9e08 r4:00000000 [<81a3e074>] (__mutex_lock_slowpath) from [<81a3e0c8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a3e08c>] (mutex_lock) from [<804e97d8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804e9770>] (_vm_unmap_aliases) from [<804ed5b8>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9770>] (_vm_unmap_aliases) from [<804ed5b8>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8551d000 r4:00000000 [<804ed44c>] (vfree) from [<805581b8>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:839c2400 r7:00000000 r6:83018400 r5:00001000 r4:7f2f8000 [<80558188>] (execmem_free) from [<803c57d0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:e46d1000 [<803c57c0>] (bpf_jit_free_exec) from [<803c5bb0>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c57c0>] (bpf_jit_free_exec) from [<803c5bb0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c5b48>] (bpf_jit_free) from [<803c6c58>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:87e3f38c r4:85c0c800 [<803c6b18>] (bpf_prog_free_deferred) from [<80278594>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:87e3f38c r4:85c0c800 [<802783e0>] (process_one_work) from [<802791dc>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783e0>] (process_one_work) from [<802791dc>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:839c2400 r8:85c0c82c r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:85c0c800 [<80278fe0>] (worker_thread) from [<80280200>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85c0c800 r8:80278fe0 r7:df841e60 r6:85b4ec00 r5:839c2400 r4:00000001 [<802800d4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfde9fb0 to 0xdfde9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800d4 r4:85c0dd80 INFO: task kworker/0:4:3783 is blocked on a mutex likely owned by task kworker/0:0:9. task:kworker/0:0 state:R running task stack:0 pid:9 tgid:9 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a399b4>] (__schedule) from [<81a3ad7c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:8320e000 r8:80200c04 r7:df83dd54 r6:ffffffff r5:8320e000 r4:00000000 [<81a3ad3c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdf83dd20 to 0xdf83dd68) dd20: d728e000 e874f000 00000001 80239bf8 7f083000 00000001 82aca1c4 82ac95a0 dd40: 7f083000 e874f000 8280c9b4 df83dd9c df83dda0 df83dd70 80230af0 80239c10 dd60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804e959c>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82aca1e4 [<804e9318>] (__purge_vmap_area_lazy) from [<804e9954>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df83ddc0 r5:df83de08 r4:df83ddc0 [<804e9770>] (_vm_unmap_aliases) from [<804ed5b8>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9770>] (_vm_unmap_aliases) from [<804ed5b8>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f34c00 r4:00000000 [<804ed44c>] (vfree) from [<805581b8>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:8320e000 r7:00000000 r6:83018400 r5:00001000 r4:7f073000 [<80558188>] (execmem_free) from [<803c57d0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:df959000 [<803c57c0>] (bpf_jit_free_exec) from [<803c5bb0>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c57c0>] (bpf_jit_free_exec) from [<803c5bb0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c5b48>] (bpf_jit_free) from [<803c6c58>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:87e7178c r4:830b9380 [<803c6b18>] (bpf_prog_free_deferred) from [<80278594>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:87e7178c r4:830b9380 [<802783e0>] (process_one_work) from [<802791dc>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783e0>] (process_one_work) from [<802791dc>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:8320e000 r8:830b93ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:830b9380 [<80278fe0>] (worker_thread) from [<80280200>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:830b9380 r8:80278fe0 r7:df819e48 r6:830b9400 r5:8320e000 r4:00000001 [<802800d4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf83dfb0 to 0xdf83dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800d4 r4:830b6340 INFO: task kworker/0:5:3866 blocked for more than 424 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:5 state:D stack:0 pid:3866 tgid:3866 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a399b4>] (__schedule) from [<81a3a948>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a399b4>] (__schedule) from [<81a3a948>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:dff0dd84 r9:00000002 r8:600f0013 r7:82917120 r6:dff0dd8c r5:84251800 r4:84251800 [<81a3a91c>] (schedule) from [<81a3ad30>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:84251800 r4:8291711c [<81a3ad18>] (schedule_preempt_disabled) from [<81a3d8e0>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3ad18>] (schedule_preempt_disabled) from [<81a3d8e0>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a3d590>] (__mutex_lock.constprop.0) from [<81a3e088>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff0de08 r4:00000000 [<81a3e074>] (__mutex_lock_slowpath) from [<81a3e0c8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a3e08c>] (mutex_lock) from [<804e97d8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804e9770>] (_vm_unmap_aliases) from [<804ed5b8>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9770>] (_vm_unmap_aliases) from [<804ed5b8>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f34f00 r4:00000000 [<804ed44c>] (vfree) from [<805581b8>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:84251800 r7:00000000 r6:83018400 r5:00001000 r4:7f077000 [<80558188>] (execmem_free) from [<803c57d0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfc57000 [<803c57c0>] (bpf_jit_free_exec) from [<803c5bb0>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c57c0>] (bpf_jit_free_exec) from [<803c5bb0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c5b48>] (bpf_jit_free) from [<803c6c58>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:87e70f8c r4:85d1f000 [<803c6b18>] (bpf_prog_free_deferred) from [<80278594>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:87e70f8c r4:85d1f000 [<802783e0>] (process_one_work) from [<802791dc>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783e0>] (process_one_work) from [<802791dc>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84251800 r8:85d1f02c r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:85d1f000 [<80278fe0>] (worker_thread) from [<80280200>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85d1f000 r8:80278fe0 r7:df841e60 r6:85ba2380 r5:84251800 r4:00000001 [<802800d4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff0dfb0 to 0xdff0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800d4 r4:85c88940 INFO: task kworker/0:5:3866 is blocked on a mutex likely owned by task kworker/0:0:9. task:kworker/0:0 state:R running task stack:0 pid:9 tgid:9 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a399b4>] (__schedule) from [<81a3ad7c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:8320e000 r8:80200c04 r7:df83dd54 r6:ffffffff r5:8320e000 r4:00000000 [<81a3ad3c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdf83dd20 to 0xdf83dd68) dd20: d728e000 e874f000 00000001 80239bf8 7f083000 00000001 82aca1c4 82ac95a0 dd40: 7f083000 e874f000 8280c9b4 df83dd9c df83dda0 df83dd70 80230af0 80239c10 dd60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804e959c>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82aca1e4 [<804e9318>] (__purge_vmap_area_lazy) from [<804e9954>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df83ddc0 r5:df83de08 r4:df83ddc0 [<804e9770>] (_vm_unmap_aliases) from [<804ed5b8>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9770>] (_vm_unmap_aliases) from [<804ed5b8>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f34c00 r4:00000000 [<804ed44c>] (vfree) from [<805581b8>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:8320e000 r7:00000000 r6:83018400 r5:00001000 r4:7f073000 [<80558188>] (execmem_free) from [<803c57d0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:df959000 [<803c57c0>] (bpf_jit_free_exec) from [<803c5bb0>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c57c0>] (bpf_jit_free_exec) from [<803c5bb0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c5b48>] (bpf_jit_free) from [<803c6c58>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:87e7178c r4:830b9380 [<803c6b18>] (bpf_prog_free_deferred) from [<80278594>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:87e7178c r4:830b9380 [<802783e0>] (process_one_work) from [<802791dc>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783e0>] (process_one_work) from [<802791dc>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:8320e000 r8:830b93ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:830b9380 [<80278fe0>] (worker_thread) from [<80280200>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:830b9380 r8:80278fe0 r7:df819e48 r6:830b9400 r5:8320e000 r4:00000001 [<802800d4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf83dfb0 to 0xdf83dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800d4 r4:830b6340 INFO: task kworker/0:6:4623 blocked for more than 446 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:6 state:D stack:0 pid:4623 tgid:4623 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a399b4>] (__schedule) from [<81a3a948>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a399b4>] (__schedule) from [<81a3a948>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:dff3dd84 r9:00000002 r8:60000113 r7:82917120 r6:dff3dd8c r5:85703c00 r4:85703c00 [<81a3a91c>] (schedule) from [<81a3ad30>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:85703c00 r4:8291711c [<81a3ad18>] (schedule_preempt_disabled) from [<81a3d8e0>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3ad18>] (schedule_preempt_disabled) from [<81a3d8e0>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a3d590>] (__mutex_lock.constprop.0) from [<81a3e088>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff3de08 r4:00000000 [<81a3e074>] (__mutex_lock_slowpath) from [<81a3e0c8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a3e08c>] (mutex_lock) from [<804e97d8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804e9770>] (_vm_unmap_aliases) from [<804ed5b8>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9770>] (_vm_unmap_aliases) from [<804ed5b8>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f34280 r4:00000000 [<804ed44c>] (vfree) from [<805581b8>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:85703c00 r7:00000000 r6:83018400 r5:00001000 r4:7f029000 [<80558188>] (execmem_free) from [<803c57d0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:df957000 [<803c57c0>] (bpf_jit_free_exec) from [<803c5bb0>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c57c0>] (bpf_jit_free_exec) from [<803c5bb0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c5b48>] (bpf_jit_free) from [<803c6c58>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:87e7138c r4:87ece300 [<803c6b18>] (bpf_prog_free_deferred) from [<80278594>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:87e7138c r4:87ece300 [<802783e0>] (process_one_work) from [<802791dc>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783e0>] (process_one_work) from [<802791dc>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85703c00 r8:87ece32c r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:87ece300 [<80278fe0>] (worker_thread) from [<80280200>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:87ece300 r8:80278fe0 r7:df841e60 r6:85fb6400 r5:85703c00 r4:00000001 [<802800d4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff3dfb0 to 0xdff3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800d4 r4:85fbacc0 INFO: task kworker/0:6:4623 is blocked on a mutex likely owned by task kworker/0:0:9. task:kworker/0:0 state:R running task stack:0 pid:9 tgid:9 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a399b4>] (__schedule) from [<81a3ad7c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:8320e000 r8:80200c04 r7:df83dd54 r6:ffffffff r5:8320e000 r4:00000000 [<81a3ad3c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdf83dd20 to 0xdf83dd68) dd20: d728e000 e874f000 00000001 80239bf8 7f083000 00000001 82aca1c4 82ac95a0 dd40: 7f083000 e874f000 8280c9b4 df83dd9c df83dda0 df83dd70 80230af0 80239c10 dd60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804e959c>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82aca1e4 [<804e9318>] (__purge_vmap_area_lazy) from [<804e9954>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df83ddc0 r5:df83de08 r4:df83ddc0 [<804e9770>] (_vm_unmap_aliases) from [<804ed5b8>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9770>] (_vm_unmap_aliases) from [<804ed5b8>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f34c00 r4:00000000 [<804ed44c>] (vfree) from [<805581b8>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:8320e000 r7:00000000 r6:83018400 r5:00001000 r4:7f073000 [<80558188>] (execmem_free) from [<803c57d0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:df959000 [<803c57c0>] (bpf_jit_free_exec) from [<803c5bb0>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c57c0>] (bpf_jit_free_exec) from [<803c5bb0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c5b48>] (bpf_jit_free) from [<803c6c58>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:87e7178c r4:830b9380 [<803c6b18>] (bpf_prog_free_deferred) from [<80278594>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:87e7178c r4:830b9380 [<802783e0>] (process_one_work) from [<802791dc>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783e0>] (process_one_work) from [<802791dc>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:8320e000 r8:830b93ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:830b9380 [<80278fe0>] (worker_thread) from [<80280200>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:830b9380 r8:80278fe0 r7:df819e48 r6:830b9400 r5:8320e000 r4:00000001 [<802800d4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf83dfb0 to 0xdf83dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800d4 r4:830b6340 INFO: task kworker/0:8:4625 blocked for more than 424 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:8 state:D stack:0 pid:4625 tgid:4625 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a399b4>] (__schedule) from [<81a3a948>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a399b4>] (__schedule) from [<81a3a948>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:e0245d84 r9:00000002 r8:600f0013 r7:82917120 r6:e0245d8c r5:85a56000 r4:85a56000 [<81a3a91c>] (schedule) from [<81a3ad30>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:85a56000 r4:8291711c [<81a3ad18>] (schedule_preempt_disabled) from [<81a3d8e0>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3ad18>] (schedule_preempt_disabled) from [<81a3d8e0>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a3d590>] (__mutex_lock.constprop.0) from [<81a3e088>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0245e08 r4:00000000 [<81a3e074>] (__mutex_lock_slowpath) from [<81a3e0c8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a3e08c>] (mutex_lock) from [<804e97d8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804e9770>] (_vm_unmap_aliases) from [<804ed5b8>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9770>] (_vm_unmap_aliases) from [<804ed5b8>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f34b00 r4:00000000 [<804ed44c>] (vfree) from [<805581b8>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:85a56000 r7:00000000 r6:83018400 r5:00001000 r4:7f071000 [<80558188>] (execmem_free) from [<803c57d0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfc55000 [<803c57c0>] (bpf_jit_free_exec) from [<803c5bb0>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c57c0>] (bpf_jit_free_exec) from [<803c5bb0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c5b48>] (bpf_jit_free) from [<803c6c58>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:87e70b8c r4:87ece280 [<803c6b18>] (bpf_prog_free_deferred) from [<80278594>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:87e70b8c r4:87ece280 [<802783e0>] (process_one_work) from [<802791dc>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783e0>] (process_one_work) from [<802791dc>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85a56000 r8:87ece2ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:87ece280 [<80278fe0>] (worker_thread) from [<80280200>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:87ece280 r8:80278fe0 r7:dff41e60 r6:85fb6580 r5:85a56000 r4:00000001 [<802800d4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0245fb0 to 0xe0245ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800d4 r4:85fbacc0 INFO: task kworker/0:8:4625 is blocked on a mutex likely owned by task kworker/0:0:9. task:kworker/0:0 state:R running task stack:0 pid:9 tgid:9 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a399b4>] (__schedule) from [<81a3ad7c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:8320e000 r8:80200c04 r7:df83dd54 r6:ffffffff r5:8320e000 r4:00000000 [<81a3ad3c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdf83dd20 to 0xdf83dd68) dd20: d728e000 e874f000 00000001 80239bf8 7f083000 00000001 82aca1c4 82ac95a0 dd40: 7f083000 e874f000 8280c9b4 df83dd9c df83dda0 df83dd70 80230af0 80239c10 dd60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804e959c>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82aca1e4 [<804e9318>] (__purge_vmap_area_lazy) from [<804e9954>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df83ddc0 r5:df83de08 r4:df83ddc0 [<804e9770>] (_vm_unmap_aliases) from [<804ed5b8>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9770>] (_vm_unmap_aliases) from [<804ed5b8>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f34c00 r4:00000000 [<804ed44c>] (vfree) from [<805581b8>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:8320e000 r7:00000000 r6:83018400 r5:00001000 r4:7f073000 [<80558188>] (execmem_free) from [<803c57d0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:df959000 [<803c57c0>] (bpf_jit_free_exec) from [<803c5bb0>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c57c0>] (bpf_jit_free_exec) from [<803c5bb0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c5b48>] (bpf_jit_free) from [<803c6c58>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:87e7178c r4:830b9380 [<803c6b18>] (bpf_prog_free_deferred) from [<80278594>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:87e7178c r4:830b9380 [<802783e0>] (process_one_work) from [<802791dc>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783e0>] (process_one_work) from [<802791dc>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:8320e000 r8:830b93ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:830b9380 [<80278fe0>] (worker_thread) from [<80280200>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:830b9380 r8:80278fe0 r7:df819e48 r6:830b9400 r5:8320e000 r4:00000001 [<802800d4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf83dfb0 to 0xdf83dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800d4 r4:830b6340 INFO: task kworker/0:9:4633 blocked for more than 446 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:9 state:D stack:0 pid:4633 tgid:4633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a399b4>] (__schedule) from [<81a3a948>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a399b4>] (__schedule) from [<81a3a948>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:e027dd84 r9:00000002 r8:60070013 r7:82917120 r6:e027dd8c r5:839b6000 r4:839b6000 [<81a3a91c>] (schedule) from [<81a3ad30>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:839b6000 r4:8291711c [<81a3ad18>] (schedule_preempt_disabled) from [<81a3d8e0>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3ad18>] (schedule_preempt_disabled) from [<81a3d8e0>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a3d590>] (__mutex_lock.constprop.0) from [<81a3e088>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e027de08 r4:00000000 [<81a3e074>] (__mutex_lock_slowpath) from [<81a3e0c8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a3e08c>] (mutex_lock) from [<804e97d8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804e9770>] (_vm_unmap_aliases) from [<804ed5b8>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9770>] (_vm_unmap_aliases) from [<804ed5b8>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f34a00 r4:00000000 [<804ed44c>] (vfree) from [<805581b8>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:839b6000 r7:00000000 r6:83018400 r5:00001000 r4:7f083000 [<80558188>] (execmem_free) from [<803c57d0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfa11000 [<803c57c0>] (bpf_jit_free_exec) from [<803c5bb0>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c57c0>] (bpf_jit_free_exec) from [<803c5bb0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c5b48>] (bpf_jit_free) from [<803c6c58>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85ed5f8c r4:87ece400 [<803c6b18>] (bpf_prog_free_deferred) from [<80278594>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:85ed5f8c r4:87ece400 [<802783e0>] (process_one_work) from [<802791dc>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783e0>] (process_one_work) from [<802791dc>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:839b6000 r8:87ece42c r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:87ece400 [<80278fe0>] (worker_thread) from [<80280200>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:87ece400 r8:80278fe0 r7:dff41e60 r6:85fb6600 r5:839b6000 r4:00000001 [<802800d4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe027dfb0 to 0xe027dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800d4 r4:85fbd240 INFO: task kworker/0:9:4633 is blocked on a mutex likely owned by task kworker/0:0:9. task:kworker/0:0 state:R running task stack:0 pid:9 tgid:9 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a399b4>] (__schedule) from [<81a3ad7c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:8320e000 r8:80200c04 r7:df83dd54 r6:ffffffff r5:8320e000 r4:00000000 [<81a3ad3c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdf83dd20 to 0xdf83dd68) dd20: d728e000 e874f000 00000001 80239bf8 7f083000 00000001 82aca1c4 82ac95a0 dd40: 7f083000 e874f000 8280c9b4 df83dd9c df83dda0 df83dd70 80230af0 80239c10 dd60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804e959c>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82aca1e4 [<804e9318>] (__purge_vmap_area_lazy) from [<804e9954>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df83ddc0 r5:df83de08 r4:df83ddc0 [<804e9770>] (_vm_unmap_aliases) from [<804ed5b8>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9770>] (_vm_unmap_aliases) from [<804ed5b8>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f34c00 r4:00000000 [<804ed44c>] (vfree) from [<805581b8>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:8320e000 r7:00000000 r6:83018400 r5:00001000 r4:7f073000 [<80558188>] (execmem_free) from [<803c57d0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:df959000 [<803c57c0>] (bpf_jit_free_exec) from [<803c5bb0>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c57c0>] (bpf_jit_free_exec) from [<803c5bb0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c5b48>] (bpf_jit_free) from [<803c6c58>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:87e7178c r4:830b9380 [<803c6b18>] (bpf_prog_free_deferred) from [<80278594>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:87e7178c r4:830b9380 [<802783e0>] (process_one_work) from [<802791dc>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783e0>] (process_one_work) from [<802791dc>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:8320e000 r8:830b93ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:830b9380 [<80278fe0>] (worker_thread) from [<80280200>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:830b9380 r8:80278fe0 r7:df819e48 r6:830b9400 r5:8320e000 r4:00000001 [<802800d4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf83dfb0 to 0xdf83dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800d4 r4:830b6340 INFO: task kworker/0:1:6528 blocked for more than 427 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1 state:D stack:0 pid:6528 tgid:6528 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a399b4>] (__schedule) from [<81a3a948>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a399b4>] (__schedule) from [<81a3a948>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:dfb05d84 r9:00000002 r8:60000113 r7:82917120 r6:dfb05d8c r5:85925400 r4:85925400 [<81a3a91c>] (schedule) from [<81a3ad30>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:85925400 r4:8291711c [<81a3ad18>] (schedule_preempt_disabled) from [<81a3d8e0>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3ad18>] (schedule_preempt_disabled) from [<81a3d8e0>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a3d590>] (__mutex_lock.constprop.0) from [<81a3e088>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb05e08 r4:00000000 [<81a3e074>] (__mutex_lock_slowpath) from [<81a3e0c8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a3e08c>] (mutex_lock) from [<804e97d8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804e9770>] (_vm_unmap_aliases) from [<804ed5b8>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9770>] (_vm_unmap_aliases) from [<804ed5b8>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:87ef7ec0 r4:00000000 [<804ed44c>] (vfree) from [<805581b8>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:85925400 r7:00000000 r6:83018400 r5:00001000 r4:7f029000 [<80558188>] (execmem_free) from [<803c57d0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:e032d000 [<803c57c0>] (bpf_jit_free_exec) from [<803c5bb0>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c57c0>] (bpf_jit_free_exec) from [<803c5bb0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c5b48>] (bpf_jit_free) from [<803c6c58>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:871dcf8c r4:85e52100 [<803c6b18>] (bpf_prog_free_deferred) from [<80278594>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:871dcf8c r4:85e52100 [<802783e0>] (process_one_work) from [<802791dc>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783e0>] (process_one_work) from [<802791dc>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85925400 r8:85e5212c r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:85e52100 [<80278fe0>] (worker_thread) from [<80280200>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85e52100 r8:80278fe0 r7:dff41e60 r6:85e30700 r5:85925400 r4:00000001 [<802800d4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb05fb0 to 0xdfb05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800d4 r4:87ea3f80 INFO: task kworker/0:1:6528 is blocked on a mutex likely owned by task kworker/0:0:9. task:kworker/0:0 state:R running task stack:0 pid:9 tgid:9 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a399b4>] (__schedule) from [<81a3ad7c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:8320e000 r8:80200c04 r7:df83dd54 r6:ffffffff r5:8320e000 r4:00000000 [<81a3ad3c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdf83dd20 to 0xdf83dd68) dd20: d797d000 e874f000 00000001 80239bf8 7f083000 00000001 82aca1c4 82ac95a0 dd40: 7f083000 e874f000 8280c9b4 df83dd9c df83dda0 df83dd70 80230af0 80239c10 dd60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804e959c>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82aca1e4 [<804e9318>] (__purge_vmap_area_lazy) from [<804e9954>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df83ddc0 r5:df83de08 r4:df83ddc0 [<804e9770>] (_vm_unmap_aliases) from [<804ed5b8>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9770>] (_vm_unmap_aliases) from [<804ed5b8>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f34c00 r4:00000000 [<804ed44c>] (vfree) from [<805581b8>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:8320e000 r7:00000000 r6:83018400 r5:00001000 r4:7f073000 [<80558188>] (execmem_free) from [<803c57d0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:df959000 [<803c57c0>] (bpf_jit_free_exec) from [<803c5bb0>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c57c0>] (bpf_jit_free_exec) from [<803c5bb0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c5b48>] (bpf_jit_free) from [<803c6c58>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:87e7178c r4:830b9380 [<803c6b18>] (bpf_prog_free_deferred) from [<80278594>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:87e7178c r4:830b9380 [<802783e0>] (process_one_work) from [<802791dc>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783e0>] (process_one_work) from [<802791dc>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:8320e000 r8:830b93ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:830b9380 [<80278fe0>] (worker_thread) from [<80280200>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:830b9380 r8:80278fe0 r7:df819e48 r6:830b9400 r5:8320e000 r4:00000001 [<802800d4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf83dfb0 to 0xdf83dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800d4 r4:830b6340 INFO: task kworker/0:10:8027 blocked for more than 452 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:10 state:D stack:0 pid:8027 tgid:8027 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a399b4>] (__schedule) from [<81a3a948>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a399b4>] (__schedule) from [<81a3a948>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:dfb95d84 r9:00000002 r8:60000013 r7:82917120 r6:dfb95d8c r5:85a23000 r4:85a23000 [<81a3a91c>] (schedule) from [<81a3ad30>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:85a23000 r4:8291711c [<81a3ad18>] (schedule_preempt_disabled) from [<81a3d8e0>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3ad18>] (schedule_preempt_disabled) from [<81a3d8e0>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a3d590>] (__mutex_lock.constprop.0) from [<81a3e088>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb95e08 r4:00000000 [<81a3e074>] (__mutex_lock_slowpath) from [<81a3e0c8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a3e08c>] (mutex_lock) from [<804e97d8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804e9770>] (_vm_unmap_aliases) from [<804ed5b8>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9770>] (_vm_unmap_aliases) from [<804ed5b8>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ba5640 r4:00000000 [<804ed44c>] (vfree) from [<805581b8>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:85a23000 r7:00000000 r6:83018400 r5:00001000 r4:7f085000 [<80558188>] (execmem_free) from [<803c57d0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfa1b000 [<803c57c0>] (bpf_jit_free_exec) from [<803c5bb0>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c57c0>] (bpf_jit_free_exec) from [<803c5bb0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c5b48>] (bpf_jit_free) from [<803c6c58>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85ed778c r4:8493ff00 [<803c6b18>] (bpf_prog_free_deferred) from [<80278594>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:85ed778c r4:8493ff00 [<802783e0>] (process_one_work) from [<802791dc>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783e0>] (process_one_work) from [<802791dc>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85a23000 r8:8493ff2c r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:8493ff00 [<80278fe0>] (worker_thread) from [<80280200>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8493ff00 r8:80278fe0 r7:e027de60 r6:85f98200 r5:85a23000 r4:00000001 [<802800d4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb95fb0 to 0xdfb95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800d4 r4:87ea3900 INFO: task kworker/0:10:8027 is blocked on a mutex likely owned by task kworker/0:0:9. task:kworker/0:0 state:R running task stack:0 pid:9 tgid:9 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a399b4>] (__schedule) from [<81a3ad7c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:8320e000 r8:80200c04 r7:df83dd54 r6:ffffffff r5:8320e000 r4:00000000 [<81a3ad3c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdf83dd20 to 0xdf83dd68) dd20: d797d000 e874f000 00000001 80239bf8 7f083000 00000001 82aca1c4 82ac95a0 dd40: 7f083000 e874f000 8280c9b4 df83dd9c df83dda0 df83dd70 80230af0 80239c10 dd60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804e959c>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82aca1e4 [<804e9318>] (__purge_vmap_area_lazy) from [<804e9954>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df83ddc0 r5:df83de08 r4:df83ddc0 [<804e9770>] (_vm_unmap_aliases) from [<804ed5b8>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9770>] (_vm_unmap_aliases) from [<804ed5b8>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f34c00 r4:00000000 [<804ed44c>] (vfree) from [<805581b8>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:8320e000 r7:00000000 r6:83018400 r5:00001000 r4:7f073000 [<80558188>] (execmem_free) from [<803c57d0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:df959000 [<803c57c0>] (bpf_jit_free_exec) from [<803c5bb0>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c57c0>] (bpf_jit_free_exec) from [<803c5bb0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c5b48>] (bpf_jit_free) from [<803c6c58>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:87e7178c r4:830b9380 [<803c6b18>] (bpf_prog_free_deferred) from [<80278594>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:87e7178c r4:830b9380 [<802783e0>] (process_one_work) from [<802791dc>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783e0>] (process_one_work) from [<802791dc>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:8320e000 r8:830b93ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:830b9380 [<80278fe0>] (worker_thread) from [<80280200>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:830b9380 r8:80278fe0 r7:df819e48 r6:830b9400 r5:8320e000 r4:00000001 [<802800d4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf83dfb0 to 0xdf83dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800d4 r4:830b6340 INFO: task kworker/0:16:9987 blocked for more than 455 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:16 state:D stack:0 pid:9987 tgid:9987 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a399b4>] (__schedule) from [<81a3a948>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a399b4>] (__schedule) from [<81a3a948>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:dfca9d84 r9:00000002 r8:60090013 r7:82917120 r6:dfca9d8c r5:855dc800 r4:855dc800 [<81a3a91c>] (schedule) from [<81a3ad30>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:855dc800 r4:8291711c [<81a3ad18>] (schedule_preempt_disabled) from [<81a3d8e0>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3ad18>] (schedule_preempt_disabled) from [<81a3d8e0>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a3d590>] (__mutex_lock.constprop.0) from [<81a3e088>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfca9e08 r4:00000000 [<81a3e074>] (__mutex_lock_slowpath) from [<81a3e0c8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a3e08c>] (mutex_lock) from [<804e97d8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804e9770>] (_vm_unmap_aliases) from [<804ed5b8>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9770>] (_vm_unmap_aliases) from [<804ed5b8>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d1d100 r4:00000000 [<804ed44c>] (vfree) from [<805581b8>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:855dc800 r7:00000000 r6:83018400 r5:00001000 r4:7f06d000 [<80558188>] (execmem_free) from [<803c57d0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:e0621000 [<803c57c0>] (bpf_jit_free_exec) from [<803c5bb0>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c57c0>] (bpf_jit_free_exec) from [<803c5bb0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c5b48>] (bpf_jit_free) from [<803c6c58>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85edbb8c r4:84964000 [<803c6b18>] (bpf_prog_free_deferred) from [<80278594>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:85edbb8c r4:84964000 [<802783e0>] (process_one_work) from [<802791dc>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783e0>] (process_one_work) from [<802791dc>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:855dc800 r8:8496402c r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:84964000 [<80278fe0>] (worker_thread) from [<80280200>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84964000 r8:80278fe0 r7:dfc01e60 r6:84964f00 r5:855dc800 r4:00000001 [<802800d4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfca9fb0 to 0xdfca9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800d4 r4:85b63440 INFO: task kworker/0:16:9987 is blocked on a mutex likely owned by task kworker/0:0:9. task:kworker/0:0 state:R running task stack:0 pid:9 tgid:9 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a399b4>] (__schedule) from [<81a3ad7c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:8320e000 r8:80200c04 r7:df83dd54 r6:ffffffff r5:8320e000 r4:00000000 [<81a3ad3c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdf83dd20 to 0xdf83dd68) dd20: d81fb000 e874f000 00000001 80239bf8 7f083000 00000001 82aca1c4 82ac95a0 dd40: 7f083000 e874f000 8280c9b4 df83dd9c df83dda0 df83dd70 80230af0 80239c10 dd60: 80000013 ffffffff r5:80000013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804e959c>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82aca1e4 [<804e9318>] (__purge_vmap_area_lazy) from [<804e9954>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df83ddc0 r5:df83de08 r4:df83ddc0 [<804e9770>] (_vm_unmap_aliases) from [<804ed5b8>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9770>] (_vm_unmap_aliases) from [<804ed5b8>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f34c00 r4:00000000 [<804ed44c>] (vfree) from [<805581b8>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:8320e000 r7:00000000 r6:83018400 r5:00001000 r4:7f073000 [<80558188>] (execmem_free) from [<803c57d0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:df959000 [<803c57c0>] (bpf_jit_free_exec) from [<803c5bb0>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c57c0>] (bpf_jit_free_exec) from [<803c5bb0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c5b48>] (bpf_jit_free) from [<803c6c58>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:87e7178c r4:830b9380 [<803c6b18>] (bpf_prog_free_deferred) from [<80278594>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:87e7178c r4:830b9380 [<802783e0>] (process_one_work) from [<802791dc>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783e0>] (process_one_work) from [<802791dc>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:8320e000 r8:830b93ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:830b9380 [<80278fe0>] (worker_thread) from [<80280200>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:830b9380 r8:80278fe0 r7:df819e48 r6:830b9400 r5:8320e000 r4:00000001 [<802800d4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf83dfb0 to 0xdf83dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800d4 r4:830b6340 NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 32 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT Hardware name: ARM-Versatile Express Call trace: [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c arch/arm/kernel/traps.c:257) r7:00000000 r6:000f0013 r5:600f0093 r4:8224e098 [<80201b08>] (show_stack) from [<8021f924>] (__dump_stack lib/dump_stack.c:94 [inline]) [<80201b08>] (show_stack) from [<8021f924>] (dump_stack_lvl+0x70/0x7c lib/dump_stack.c:120) [<8021f8b4>] (dump_stack_lvl) from [<8021f948>] (dump_stack+0x18/0x1c lib/dump_stack.c:129) r5:00000001 r4:00000001 [<8021f930>] (dump_stack) from [<81a235cc>] (nmi_cpu_backtrace+0x160/0x17c lib/nmi_backtrace.c:113) [<81a2346c>] (nmi_cpu_backtrace) from [<81a23718>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8 lib/nmi_backtrace.c:62) r7:00000001 r6:8280c690 r5:8281ae00 r4:ffffffff [<81a235e8>] (nmi_trigger_cpumask_backtrace) from [<802304fc>] (arch_trigger_cpumask_backtrace+0x18/0x1c arch/arm/kernel/smp.c:852) r9:8281b9e8 r8:8280c810 r7:00028682 r6:00007ee0 r5:82abe7d4 r4:833f450c [<802304e4>] (arch_trigger_cpumask_backtrace) from [<8037f344>] (trigger_all_cpu_backtrace include/linux/nmi.h:160 [inline]) [<802304e4>] (arch_trigger_cpumask_backtrace) from [<8037f344>] (check_hung_uninterruptible_tasks kernel/hung_task.c:332 [inline]) [<802304e4>] (arch_trigger_cpumask_backtrace) from [<8037f344>] (watchdog+0x5d0/0x850 kernel/hung_task.c:495) [<8037ed74>] (watchdog) from [<80280200>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:00000000 r8:8037ed74 r7:8332a380 r6:8332a380 r5:83399800 r4:00000001 [<802800d4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf8e1fb0 to 0xdf8e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800d4 r4:832cd340 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 11083 Comm: kworker/u9:4 Not tainted syzkaller #0 PREEMPT Hardware name: ARM-Versatile Express Workqueue: events_power_efficient neigh_periodic_work PC is at selinux_ip_postroute+0x0/0x388 security/selinux/hooks.c:5955 LR is at nf_hook_entry_hookfn include/linux/netfilter.h:158 [inline] LR is at nf_hook_slow+0x40/0x104 net/netfilter/core.c:623 pc : [<807a1090>] lr : [<816ac184>] psr: 20000113 sp : df801a98 ip : df801a80 fp : df801abc r10: 8326e114 r9 : 839caa90 r8 : df801ac4 r7 : 8499e9c0 r6 : 839caa80 r5 : 00000002 r4 : 00000001 r3 : 807a1090 r2 : df801ac4 r1 : 8499e9c0 r0 : 00000000 Flags: nzCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user Control: 30c5387d Table: 84a4b340 DAC: fffffffd Call trace: frame pointer underflow [<816ac144>] (nf_hook_slow) from [<81745154>] (nf_hook include/linux/netfilter.h:273 [inline]) [<816ac144>] (nf_hook_slow) from [<81745154>] (NF_HOOK_COND include/linux/netfilter.h:306 [inline]) [<816ac144>] (nf_hook_slow) from [<81745154>] (ip_output+0xe4/0x104 net/ipv4/ip_output.c:438) r9:8326f780 r8:85573800 r7:00000000 r6:00000000 r5:856d49c0 r4:8499e9c0 [<81745070>] (ip_output) from [<81746568>] (dst_output include/net/dst.h:464 [inline]) [<81745070>] (ip_output) from [<81746568>] (ip_local_out+0x40/0x44 net/ipv4/ip_output.c:131) r8:88d81d81 r7:88d81d80 r6:00000000 r5:856d49c0 r4:8499e9c0 [<81746528>] (ip_local_out) from [<816e1ae8>] (synproxy_send_tcp+0x124/0x190 net/netfilter/nf_synproxy_core.c:439) r7:88d81d80 r6:856d49c0 r5:85c8d300 r4:8499e9c0 [<816e19c4>] (synproxy_send_tcp) from [<816e1ecc>] (synproxy_send_client_synack+0x190/0x1e8 net/netfilter/nf_synproxy_core.c:484) r9:8326f780 r8:8326f794 r7:df801bb0 r6:8499e480 r5:00000014 r4:8499e9c0 [<816e1d3c>] (synproxy_send_client_synack) from [<8171d430>] (nft_synproxy_eval_v4 net/netfilter/nft_synproxy.c:59 [inline]) [<816e1d3c>] (synproxy_send_client_synack) from [<8171d430>] (nft_synproxy_do_eval+0x25c/0x2b4 net/netfilter/nft_synproxy.c:141) r10:81e63208 r9:8326f794 r8:85f0dec0 r7:87c9ebd8 r6:df801c7c r5:856d49c0 r4:8499e480 [<8171d1d4>] (nft_synproxy_do_eval) from [<8171d4b4>] (nft_synproxy_eval+0x14/0x18 net/netfilter/nft_synproxy.c:247) r9:df801d14 r8:81e63390 r7:81e630f4 r6:81e630b0 r5:87c9ebe0 r4:87c9ebd0 [<8171d4a0>] (nft_synproxy_eval) from [<816e4b74>] (expr_call_ops_eval net/netfilter/nf_tables_core.c:237 [inline]) [<8171d4a0>] (nft_synproxy_eval) from [<816e4b74>] (nft_do_chain+0x12c/0x570 net/netfilter/nf_tables_core.c:285) [<816e4a48>] (nft_do_chain) from [<816fea78>] (nft_do_chain_inet+0xac/0x120 net/netfilter/nft_chain_filter.c:161) r10:dddd0ec8 r9:839ca820 r8:df801d6c r7:8499e480 r6:839ca800 r5:00000004 r4:85b81f40 [<816fe9cc>] (nft_do_chain_inet) from [<816ac184>] (nf_hook_entry_hookfn include/linux/netfilter.h:158 [inline]) [<816fe9cc>] (nft_do_chain_inet) from [<816ac184>] (nf_hook_slow+0x40/0x104 net/netfilter/core.c:623) r4:00000001 [<816ac144>] (nf_hook_slow) from [<8174008c>] (nf_hook include/linux/netfilter.h:273 [inline]) [<816ac144>] (nf_hook_slow) from [<8174008c>] (NF_HOOK include/linux/netfilter.h:316 [inline]) [<816ac144>] (nf_hook_slow) from [<8174008c>] (ip_local_deliver+0xf0/0x110 net/ipv4/ip_input.c:260) r9:00000040 r8:00000007 r7:00000000 r6:856d49c0 r5:85573800 r4:8499e480 [<8173ff9c>] (ip_local_deliver) from [<8173f124>] (dst_input include/net/dst.h:474 [inline]) [<8173ff9c>] (ip_local_deliver) from [<8173f124>] (ip_rcv_finish+0x98/0xb0 net/ipv4/ip_input.c:453) r6:85573800 r5:856d49c0 r4:8499e480 [<8173f08c>] (ip_rcv_finish) from [<81740180>] (NF_HOOK include/linux/netfilter.h:318 [inline]) [<8173f08c>] (ip_rcv_finish) from [<81740180>] (NF_HOOK include/linux/netfilter.h:312 [inline]) [<8173f08c>] (ip_rcv_finish) from [<81740180>] (ip_rcv+0xd4/0xe0 net/ipv4/ip_input.c:573) r7:00000000 r6:856d49c0 r5:8499e480 r4:00000001 [<817400ac>] (ip_rcv) from [<8158bd04>] (__netif_receive_skb_one_core+0x5c/0x80 net/core/dev.c:6079) r6:00000000 r5:817400ac r4:85573800 [<8158bca8>] (__netif_receive_skb_one_core) from [<8158bd70>] (__netif_receive_skb+0x18/0x5c net/core/dev.c:6192) r5:dddd0fb0 r4:8499e480 [<8158bd58>] (__netif_receive_skb) from [<8158c078>] (process_backlog+0xa0/0x17c net/core/dev.c:6544) r5:dddd0fb0 r4:8499e480 [<8158bfd8>] (process_backlog) from [<8158c8d8>] (__napi_poll+0x34/0x240 net/core/dev.c:7594) r10:00000000 r9:df801ed8 r8:00000000 r7:df801ed3 r6:00000040 r5:dddd0fb0 r4:00000001 [<8158c8a4>] (__napi_poll) from [<8158d130>] (napi_poll net/core/dev.c:7657 [inline]) [<8158c8a4>] (__napi_poll) from [<8158d130>] (net_rx_action+0x358/0x3ec net/core/dev.c:7784) r9:df801ed8 r8:00000000 r7:0000012c r6:5b70e000 r5:dddd0fb0 r4:ffffffff [<8158cdd8>] (net_rx_action) from [<8025be18>] (handle_softirqs+0x140/0x458 kernel/softirq.c:622) r10:85e86000 r9:82804d40 r8:00000101 r7:00000003 r6:00000008 r5:00000004 r4:8280408c [<8025bcd8>] (handle_softirqs) from [<802012f0>] (__do_softirq+0x14/0x18 kernel/softirq.c:656) r10:00000000 r9:85c12420 r8:829f1428 r7:000000d5 r6:00000000 r5:00000001 r4:60000113 [<802012dc>] (__do_softirq) from [<8022858c>] (____do_softirq+0x10/0x14 arch/arm/kernel/irq.c:77) [<8022857c>] (____do_softirq) from [<81a06688>] (call_with_stack+0x1c/0x20 arch/arm/lib/call_with_stack.S:40) [<81a0666c>] (call_with_stack) from [<802285c8>] (do_softirq_own_stack+0x38/0x3c arch/arm/kernel/irq.c:82) [<80228590>] (do_softirq_own_stack) from [<8025c420>] (do_softirq kernel/softirq.c:523 [inline]) [<80228590>] (do_softirq_own_stack) from [<8025c420>] (do_softirq+0x5c/0x64 kernel/softirq.c:510) [<8025c3c4>] (do_softirq) from [<8025c4f4>] (__local_bh_enable_ip+0xcc/0xd0 kernel/softirq.c:450) r5:00000001 r4:85e86000 [<8025c428>] (__local_bh_enable_ip) from [<81a43860>] (__raw_write_unlock_bh include/linux/rwlock_api_smp.h:281 [inline]) [<8025c428>] (__local_bh_enable_ip) from [<81a43860>] (_raw_write_unlock_bh+0x2c/0x30 kernel/locking/spinlock.c:366) r5:82804d40 r4:829f14bc [<81a43834>] (_raw_write_unlock_bh) from [<8159b088>] (neigh_periodic_work+0x168/0x25c net/core/neighbour.c:1040) [<8159af20>] (neigh_periodic_work) from [<80278594>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r10:8300ea70 r9:8301d605 r8:85e86000 r7:83264000 r6:8301d600 r5:829f1428 r4:85fa8900 [<802783e0>] (process_one_work) from [<802791dc>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783e0>] (process_one_work) from [<802791dc>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85e86000 r8:85fa892c r7:82804d40 r6:83264000 r5:83264020 r4:85fa8900 [<80278fe0>] (worker_thread) from [<80280200>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85fa8900 r8:80278fe0 r7:e05e1e60 r6:85fa8200 r5:85e86000 r4:00000001 [<802800d4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe03cdfb0 to 0xe03cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800d4 r4:869c2740