INFO: task kworker/0:11:4219 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:11 state:D stack:0 pid:4219 tgid:4219 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63234>] (__schedule) from [<81a641c8>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a63234>] (__schedule) from [<81a641c8>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:e0089d84 r9:00000002 r8:60000113 r7:829171a0 r6:e0089d8c r5:84c1e000 r4:84c1e000 [<81a6419c>] (schedule) from [<81a645b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:84c1e000 r4:8291719c [<81a64598>] (schedule_preempt_disabled) from [<81a67160>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64598>] (schedule_preempt_disabled) from [<81a67160>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a66e10>] (__mutex_lock.constprop.0) from [<81a67908>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0089e08 r4:00000000 [<81a678f4>] (__mutex_lock_slowpath) from [<81a67948>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a6790c>] (mutex_lock) from [<804e9e3c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85657300 r4:00000000 [<804edab0>] (vfree) from [<80558908>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:84c1e000 r7:00000000 r6:83018400 r5:00001000 r4:7f03d000 [<805588d8>] (execmem_free) from [<803c5e38>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:e837d000 [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c61b0>] (bpf_jit_free) from [<803c72c0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:8580938c r4:855bea00 [<803c7180>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:8580938c r4:855bea00 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84c1e000 r8:855bea2c r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:855bea00 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:855bea00 r8:80278fec r7:dfaa5e60 r6:8556d100 r5:84c1e000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0089fb0 to 0xe0089ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:855f7980 INFO: task kworker/0:11:4219 is blocked on a mutex likely owned by task kworker/1:153:4815. task:kworker/1:153 state:R running task stack:0 pid:4815 tgid:4815 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63234>] (__schedule) from [<81a645fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:854a8000 r8:80200c04 r7:ea6a9d54 r6:ffffffff r5:854a8000 r4:00000000 [<81a645bc>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea6a9d20 to 0xea6a9d68) 9d20: e24a5000 ebf27000 00000001 80239bf8 dfb67000 00000001 82acb1c4 82aca5a0 9d40: dfb67000 ebf27000 8280c9b4 ea6a9d9c ea6a9da0 ea6a9d70 80230af0 80239c10 9d60: 800b0013 ffffffff r5:800b0013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804e9c00>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e997c>] (__purge_vmap_area_lazy) from [<804e9fb8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea6a9dc0 r5:ea6a9e08 r4:ea6a9dc0 [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85657fc0 r4:00000000 [<804edab0>] (vfree) from [<80558908>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:854a8000 r7:00000000 r6:83018600 r5:00001000 r4:7f02d000 [<805588d8>] (execmem_free) from [<803c5e38>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfc99000 [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c61b0>] (bpf_jit_free) from [<803c72c0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:8580a38c r4:85659080 [<803c7180>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:8580a38c r4:85659080 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:854a8000 r8:856590ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85659080 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85659080 r8:80278fec r7:ea7b9e60 r6:85659180 r5:854a8000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea6a9fb0 to 0xea6a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85657dc0 INFO: task kworker/0:12:4221 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:12 state:D stack:0 pid:4221 tgid:4221 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63234>] (__schedule) from [<81a641c8>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a63234>] (__schedule) from [<81a641c8>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:dfbb9d84 r9:00000002 r8:60000113 r7:829171a0 r6:dfbb9d8c r5:833b8c00 r4:833b8c00 [<81a6419c>] (schedule) from [<81a645b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:833b8c00 r4:8291719c [<81a64598>] (schedule_preempt_disabled) from [<81a67160>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64598>] (schedule_preempt_disabled) from [<81a67160>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a66e10>] (__mutex_lock.constprop.0) from [<81a67908>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbb9e08 r4:00000000 [<81a678f4>] (__mutex_lock_slowpath) from [<81a67948>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a6790c>] (mutex_lock) from [<804e9e3c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85657d00 r4:00000000 [<804edab0>] (vfree) from [<80558908>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:833b8c00 r7:00000000 r6:83018400 r5:00001000 r4:7f037000 [<805588d8>] (execmem_free) from [<803c5e38>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:e4287000 [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c61b0>] (bpf_jit_free) from [<803c72c0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:857cd78c r4:855bed00 [<803c7180>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:857cd78c r4:855bed00 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:833b8c00 r8:855bed2c r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:855bed00 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:855bed00 r8:80278fec r7:dfaa5e60 r6:855beb80 r5:833b8c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbb9fb0 to 0xdfbb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85514b40 INFO: task kworker/0:12:4221 is blocked on a mutex likely owned by task kworker/1:153:4815. task:kworker/1:153 state:R running task stack:0 pid:4815 tgid:4815 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63234>] (__schedule) from [<81a645fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:854a8000 r8:80200c04 r7:ea6a9d54 r6:ffffffff r5:854a8000 r4:00000000 [<81a645bc>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea6a9d20 to 0xea6a9d68) 9d20: e24a5000 ebf27000 00000001 80239bf8 dfb67000 00000001 82acb1c4 82aca5a0 9d40: dfb67000 ebf27000 8280c9b4 ea6a9d9c ea6a9da0 ea6a9d70 80230af0 80239c10 9d60: 800b0013 ffffffff r5:800b0013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804e9c00>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e997c>] (__purge_vmap_area_lazy) from [<804e9fb8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea6a9dc0 r5:ea6a9e08 r4:ea6a9dc0 [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85657fc0 r4:00000000 [<804edab0>] (vfree) from [<80558908>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:854a8000 r7:00000000 r6:83018600 r5:00001000 r4:7f02d000 [<805588d8>] (execmem_free) from [<803c5e38>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfc99000 [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c61b0>] (bpf_jit_free) from [<803c72c0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:8580a38c r4:85659080 [<803c7180>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:8580a38c r4:85659080 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:854a8000 r8:856590ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85659080 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85659080 r8:80278fec r7:ea7b9e60 r6:85659180 r5:854a8000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea6a9fb0 to 0xea6a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85657dc0 INFO: task kworker/0:15:4227 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:15 state:D stack:0 pid:4227 tgid:4227 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63234>] (__schedule) from [<81a641c8>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a63234>] (__schedule) from [<81a641c8>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:e0155d84 r9:00000002 r8:60000013 r7:829171a0 r6:e0155d8c r5:83afb000 r4:83afb000 [<81a6419c>] (schedule) from [<81a645b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:83afb000 r4:8291719c [<81a64598>] (schedule_preempt_disabled) from [<81a67160>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64598>] (schedule_preempt_disabled) from [<81a67160>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a66e10>] (__mutex_lock.constprop.0) from [<81a67908>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0155e08 r4:00000000 [<81a678f4>] (__mutex_lock_slowpath) from [<81a67948>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a6790c>] (mutex_lock) from [<804e9e3c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85649700 r4:00000000 [<804edab0>] (vfree) from [<80558908>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:83afb000 r7:00000000 r6:83018400 r5:00001000 r4:7f00b000 [<805588d8>] (execmem_free) from [<803c5e38>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:df9fd000 [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c61b0>] (bpf_jit_free) from [<803c72c0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:8559a78c r4:855be580 [<803c7180>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:8559a78c r4:855be580 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:83afb000 r8:855be5ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:855be580 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:855be580 r8:80278fec r7:e0149e60 r6:855bee80 r5:83afb000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0155fb0 to 0xe0155ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85517180 INFO: task kworker/0:15:4227 is blocked on a mutex likely owned by task kworker/1:153:4815. task:kworker/1:153 state:R running task stack:0 pid:4815 tgid:4815 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63234>] (__schedule) from [<81a645fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:854a8000 r8:80200c04 r7:ea6a9d54 r6:ffffffff r5:854a8000 r4:00000000 [<81a645bc>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea6a9d20 to 0xea6a9d68) 9d20: e2a44000 ebf27000 00000001 80239bf8 dfb67000 00000001 82acb1c4 82aca5a0 9d40: dfb67000 ebf27000 8280c9b4 ea6a9d9c ea6a9da0 ea6a9d70 80230af0 80239c10 9d60: 800b0013 ffffffff r5:800b0013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804e9c00>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e997c>] (__purge_vmap_area_lazy) from [<804e9fb8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea6a9dc0 r5:ea6a9e08 r4:ea6a9dc0 [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85657fc0 r4:00000000 [<804edab0>] (vfree) from [<80558908>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:854a8000 r7:00000000 r6:83018600 r5:00001000 r4:7f02d000 [<805588d8>] (execmem_free) from [<803c5e38>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfc99000 [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c61b0>] (bpf_jit_free) from [<803c72c0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:8580a38c r4:85659080 [<803c7180>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:8580a38c r4:85659080 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:854a8000 r8:856590ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85659080 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85659080 r8:80278fec r7:ea7b9e60 r6:85659180 r5:854a8000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea6a9fb0 to 0xea6a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85657dc0 INFO: task kworker/0:16:4230 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:16 state:D stack:0 pid:4230 tgid:4230 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63234>] (__schedule) from [<81a641c8>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a63234>] (__schedule) from [<81a641c8>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:e018dd84 r9:00000002 r8:60000013 r7:829171a0 r6:e018dd8c r5:85618000 r4:85618000 [<81a6419c>] (schedule) from [<81a645b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:85618000 r4:8291719c [<81a64598>] (schedule_preempt_disabled) from [<81a67160>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64598>] (schedule_preempt_disabled) from [<81a67160>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a66e10>] (__mutex_lock.constprop.0) from [<81a67908>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e018de08 r4:00000000 [<81a678f4>] (__mutex_lock_slowpath) from [<81a67948>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a6790c>] (mutex_lock) from [<804e9e3c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8563bdc0 r4:00000000 [<804edab0>] (vfree) from [<80558908>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:85618000 r7:00000000 r6:83018400 r5:00001000 r4:7f029000 [<805588d8>] (execmem_free) from [<803c5e38>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfb69000 [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c61b0>] (bpf_jit_free) from [<803c72c0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:8574438c r4:855bef00 [<803c7180>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:8574438c r4:855bef00 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85618000 r8:855bef2c r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:855bef00 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:855bef00 r8:80278fec r7:e0149e60 r6:855be800 r5:85618000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe018dfb0 to 0xe018dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85517700 INFO: task kworker/0:16:4230 is blocked on a mutex likely owned by task kworker/1:153:4815. task:kworker/1:153 state:R running task stack:0 pid:4815 tgid:4815 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63234>] (__schedule) from [<81a645fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:854a8000 r8:80200c04 r7:ea6a9d54 r6:ffffffff r5:854a8000 r4:00000000 [<81a645bc>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea6a9d20 to 0xea6a9d68) 9d20: e2a44000 ebf27000 00000001 80239bf8 dfb67000 00000001 82acb1c4 82aca5a0 9d40: dfb67000 ebf27000 8280c9b4 ea6a9d9c ea6a9da0 ea6a9d70 80230af0 80239c10 9d60: 800b0013 ffffffff r5:800b0013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804e9c00>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e997c>] (__purge_vmap_area_lazy) from [<804e9fb8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea6a9dc0 r5:ea6a9e08 r4:ea6a9dc0 [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85657fc0 r4:00000000 [<804edab0>] (vfree) from [<80558908>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:854a8000 r7:00000000 r6:83018600 r5:00001000 r4:7f02d000 [<805588d8>] (execmem_free) from [<803c5e38>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfc99000 [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c61b0>] (bpf_jit_free) from [<803c72c0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:8580a38c r4:85659080 [<803c7180>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:8580a38c r4:85659080 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:854a8000 r8:856590ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85659080 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85659080 r8:80278fec r7:ea7b9e60 r6:85659180 r5:854a8000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea6a9fb0 to 0xea6a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85657dc0 INFO: task kworker/0:151:4747 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:151 state:D stack:0 pid:4747 tgid:4747 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63234>] (__schedule) from [<81a641c8>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a63234>] (__schedule) from [<81a641c8>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ea719d84 r9:00000002 r8:60000113 r7:829171a0 r6:ea719d8c r5:85775400 r4:85775400 [<81a6419c>] (schedule) from [<81a645b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:85775400 r4:8291719c [<81a64598>] (schedule_preempt_disabled) from [<81a67160>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64598>] (schedule_preempt_disabled) from [<81a67160>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a66e10>] (__mutex_lock.constprop.0) from [<81a67908>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea719e08 r4:00000000 [<81a678f4>] (__mutex_lock_slowpath) from [<81a67948>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a6790c>] (mutex_lock) from [<804e9e3c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a55ec0 r4:00000000 [<804edab0>] (vfree) from [<80558908>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:85775400 r7:00000000 r6:83018400 r5:00001000 r4:7f02d000 [<805588d8>] (execmem_free) from [<803c5e38>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:e00b7000 [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c61b0>] (bpf_jit_free) from [<803c72c0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:857e178c r4:8564db00 [<803c7180>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:857e178c r4:8564db00 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85775400 r8:8564db2c r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:8564db00 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8564db00 r8:80278fec r7:ea671e60 r6:8563a880 r5:85775400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea719fb0 to 0xea719ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85640e80 INFO: task kworker/0:151:4747 is blocked on a mutex likely owned by task kworker/1:153:4815. task:kworker/1:153 state:R running task stack:0 pid:4815 tgid:4815 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63234>] (__schedule) from [<81a645fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:854a8000 r8:80200c04 r7:ea6a9d54 r6:ffffffff r5:854a8000 r4:00000000 [<81a645bc>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea6a9d20 to 0xea6a9d68) 9d20: e3063000 ebf27000 00000001 80239bf8 dfb67000 00000001 82acb1c4 82aca5a0 9d40: dfb67000 ebf27000 8280c9b4 ea6a9d9c ea6a9da0 ea6a9d70 80230af0 80239c10 9d60: 800b0013 ffffffff r5:800b0013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804e9c00>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e997c>] (__purge_vmap_area_lazy) from [<804e9fb8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea6a9dc0 r5:ea6a9e08 r4:ea6a9dc0 [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85657fc0 r4:00000000 [<804edab0>] (vfree) from [<80558908>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:854a8000 r7:00000000 r6:83018600 r5:00001000 r4:7f02d000 [<805588d8>] (execmem_free) from [<803c5e38>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfc99000 [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c61b0>] (bpf_jit_free) from [<803c72c0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:8580a38c r4:85659080 [<803c7180>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:8580a38c r4:85659080 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:854a8000 r8:856590ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85659080 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85659080 r8:80278fec r7:ea7b9e60 r6:85659180 r5:854a8000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea6a9fb0 to 0xea6a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85657dc0 INFO: task kworker/1:151:4809 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:151 state:D stack:0 pid:4809 tgid:4809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63234>] (__schedule) from [<81a641c8>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a63234>] (__schedule) from [<81a641c8>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ea7b9d84 r9:00000002 r8:60000013 r7:829171a0 r6:ea7b9d8c r5:854a0c00 r4:854a0c00 [<81a6419c>] (schedule) from [<81a645b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:854a0c00 r4:8291719c [<81a64598>] (schedule_preempt_disabled) from [<81a67160>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64598>] (schedule_preempt_disabled) from [<81a67160>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a66e10>] (__mutex_lock.constprop.0) from [<81a67908>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea7b9e08 r4:00000000 [<81a678f4>] (__mutex_lock_slowpath) from [<81a67948>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a6790c>] (mutex_lock) from [<804e9e3c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85657680 r4:00000000 [<804edab0>] (vfree) from [<80558908>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:854a0c00 r7:00000000 r6:83018600 r5:00001000 r4:7f031000 [<805588d8>] (execmem_free) from [<803c5e38>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:e0143000 [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c61b0>] (bpf_jit_free) from [<803c72c0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:8580a78c r4:85642f00 [<803c7180>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:8580a78c r4:85642f00 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:854a0c00 r8:85642f2c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85642f00 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85642f00 r8:80278fec r7:ea659e60 r6:85642f80 r5:854a0c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea7b9fb0 to 0xea7b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85657000 INFO: task kworker/1:151:4809 is blocked on a mutex likely owned by task kworker/1:153:4815. task:kworker/1:153 state:R running task stack:0 pid:4815 tgid:4815 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63234>] (__schedule) from [<81a645fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:854a8000 r8:80200c04 r7:ea6a9d54 r6:ffffffff r5:854a8000 r4:00000000 [<81a645bc>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea6a9d20 to 0xea6a9d68) 9d20: e330b000 ebf27000 00000001 80239bf8 dfb67000 00000001 82acb1c4 82aca5a0 9d40: dfb67000 ebf27000 8280c9b4 ea6a9d9c ea6a9da0 ea6a9d70 80230af0 80239c10 9d60: 800b0013 ffffffff r5:800b0013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804e9c00>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e997c>] (__purge_vmap_area_lazy) from [<804e9fb8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea6a9dc0 r5:ea6a9e08 r4:ea6a9dc0 [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85657fc0 r4:00000000 [<804edab0>] (vfree) from [<80558908>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:854a8000 r7:00000000 r6:83018600 r5:00001000 r4:7f02d000 [<805588d8>] (execmem_free) from [<803c5e38>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfc99000 [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c61b0>] (bpf_jit_free) from [<803c72c0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:8580a38c r4:85659080 [<803c7180>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:8580a38c r4:85659080 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:854a8000 r8:856590ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85659080 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85659080 r8:80278fec r7:ea7b9e60 r6:85659180 r5:854a8000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea6a9fb0 to 0xea6a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85657dc0 INFO: task kworker/1:152:4811 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:152 state:D stack:0 pid:4811 tgid:4811 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63234>] (__schedule) from [<81a641c8>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a63234>] (__schedule) from [<81a641c8>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ea7d9d84 r9:00000002 r8:60000113 r7:829171a0 r6:ea7d9d8c r5:854a3000 r4:854a3000 [<81a6419c>] (schedule) from [<81a645b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:854a3000 r4:8291719c [<81a64598>] (schedule_preempt_disabled) from [<81a67160>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64598>] (schedule_preempt_disabled) from [<81a67160>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a66e10>] (__mutex_lock.constprop.0) from [<81a67908>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea7d9e08 r4:00000000 [<81a678f4>] (__mutex_lock_slowpath) from [<81a67948>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a6790c>] (mutex_lock) from [<804e9e3c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85649bc0 r4:00000000 [<804edab0>] (vfree) from [<80558908>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:854a3000 r7:00000000 r6:83018600 r5:00001000 r4:7f03f000 [<805588d8>] (execmem_free) from [<803c5e38>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea3ff000 [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c61b0>] (bpf_jit_free) from [<803c72c0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:8580af8c r4:85642b00 [<803c7180>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:8580af8c r4:85642b00 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:854a3000 r8:85642b2c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85642b00 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85642b00 r8:80278fec r7:ea7b9e60 r6:85659000 r5:854a3000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea7d9fb0 to 0xea7d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:856574c0 INFO: task kworker/1:152:4811 is blocked on a mutex likely owned by task kworker/1:153:4815. task:kworker/1:153 state:R running task stack:0 pid:4815 tgid:4815 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63234>] (__schedule) from [<81a645fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:854a8000 r8:80200c04 r7:ea6a9d54 r6:ffffffff r5:854a8000 r4:00000000 [<81a645bc>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea6a9d20 to 0xea6a9d68) 9d20: e330b000 ebf27000 00000001 80239bf8 dfb67000 00000001 82acb1c4 82aca5a0 9d40: dfb67000 ebf27000 8280c9b4 ea6a9d9c ea6a9da0 ea6a9d70 80230af0 80239c10 9d60: 800b0013 ffffffff r5:800b0013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804e9c00>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e997c>] (__purge_vmap_area_lazy) from [<804e9fb8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea6a9dc0 r5:ea6a9e08 r4:ea6a9dc0 [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85657fc0 r4:00000000 [<804edab0>] (vfree) from [<80558908>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:854a8000 r7:00000000 r6:83018600 r5:00001000 r4:7f02d000 [<805588d8>] (execmem_free) from [<803c5e38>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfc99000 [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c61b0>] (bpf_jit_free) from [<803c72c0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:8580a38c r4:85659080 [<803c7180>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:8580a38c r4:85659080 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:854a8000 r8:856590ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85659080 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85659080 r8:80278fec r7:ea7b9e60 r6:85659180 r5:854a8000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea6a9fb0 to 0xea6a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85657dc0 INFO: task kworker/1:154:4817 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:154 state:D stack:0 pid:4817 tgid:4817 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63234>] (__schedule) from [<81a641c8>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a63234>] (__schedule) from [<81a641c8>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ea6a5d84 r9:00000002 r8:60000113 r7:829171a0 r6:ea6a5d8c r5:854a9800 r4:854a9800 [<81a6419c>] (schedule) from [<81a645b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:854a9800 r4:8291719c [<81a64598>] (schedule_preempt_disabled) from [<81a67160>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64598>] (schedule_preempt_disabled) from [<81a67160>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a66e10>] (__mutex_lock.constprop.0) from [<81a67908>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea6a5e08 r4:00000000 [<81a678f4>] (__mutex_lock_slowpath) from [<81a67948>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a6790c>] (mutex_lock) from [<804e9e3c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85657bc0 r4:00000000 [<804edab0>] (vfree) from [<80558908>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:854a9800 r7:00000000 r6:83018600 r5:00001000 r4:7f033000 [<805588d8>] (execmem_free) from [<803c5e38>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:e42d1000 [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c61b0>] (bpf_jit_free) from [<803c72c0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:857ceb8c r4:85659200 [<803c7180>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:857ceb8c r4:85659200 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:854a9800 r8:8565922c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85659200 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85659200 r8:80278fec r7:ea7d9e60 r6:85659280 r5:854a9800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea6a5fb0 to 0xea6a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85657f80 INFO: task kworker/1:154:4817 is blocked on a mutex likely owned by task kworker/1:153:4815. task:kworker/1:153 state:R running task stack:0 pid:4815 tgid:4815 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63234>] (__schedule) from [<81a645fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:854a8000 r8:80200c04 r7:ea6a9d54 r6:ffffffff r5:854a8000 r4:00000000 [<81a645bc>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea6a9d20 to 0xea6a9d68) 9d20: e330b000 ebf27000 00000001 80239bf8 dfb67000 00000001 82acb1c4 82aca5a0 9d40: dfb67000 ebf27000 8280c9b4 ea6a9d9c ea6a9da0 ea6a9d70 80230af0 80239c10 9d60: 800b0013 ffffffff r5:800b0013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804e9c00>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e997c>] (__purge_vmap_area_lazy) from [<804e9fb8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea6a9dc0 r5:ea6a9e08 r4:ea6a9dc0 [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85657fc0 r4:00000000 [<804edab0>] (vfree) from [<80558908>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:854a8000 r7:00000000 r6:83018600 r5:00001000 r4:7f02d000 [<805588d8>] (execmem_free) from [<803c5e38>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfc99000 [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c61b0>] (bpf_jit_free) from [<803c72c0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:8580a38c r4:85659080 [<803c7180>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:8580a38c r4:85659080 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:854a8000 r8:856590ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85659080 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85659080 r8:80278fec r7:ea7b9e60 r6:85659180 r5:854a8000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea6a9fb0 to 0xea6a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85657dc0 INFO: task kworker/1:155:4819 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:155 state:D stack:0 pid:4819 tgid:4819 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63234>] (__schedule) from [<81a641c8>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a63234>] (__schedule) from [<81a641c8>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ea6add84 r9:00000002 r8:60000013 r7:829171a0 r6:ea6add8c r5:854ab000 r4:854ab000 [<81a6419c>] (schedule) from [<81a645b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:854ab000 r4:8291719c [<81a64598>] (schedule_preempt_disabled) from [<81a67160>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64598>] (schedule_preempt_disabled) from [<81a67160>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a66e10>] (__mutex_lock.constprop.0) from [<81a67908>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea6ade08 r4:00000000 [<81a678f4>] (__mutex_lock_slowpath) from [<81a67948>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a6790c>] (mutex_lock) from [<804e9e3c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855f73c0 r4:00000000 [<804edab0>] (vfree) from [<80558908>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:854ab000 r7:00000000 r6:83018600 r5:00001000 r4:7f047000 [<805588d8>] (execmem_free) from [<803c5e38>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea691000 [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c61b0>] (bpf_jit_free) from [<803c72c0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:8580bf8c r4:85659380 [<803c7180>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:8580bf8c r4:85659380 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:854ab000 r8:856593ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85659380 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85659380 r8:80278fec r7:ea7d9e60 r6:85659300 r5:854ab000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea6adfb0 to 0xea6adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85657d00 INFO: task kworker/1:155:4819 is blocked on a mutex likely owned by task kworker/1:153:4815. task:kworker/1:153 state:R running task stack:0 pid:4815 tgid:4815 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63234>] (__schedule) from [<81a645fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:854a8000 r8:80200c04 r7:ea6a9d54 r6:ffffffff r5:854a8000 r4:00000000 [<81a645bc>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea6a9d20 to 0xea6a9d68) 9d20: e330b000 ebf27000 00000001 80239bf8 dfb67000 00000001 82acb1c4 82aca5a0 9d40: dfb67000 ebf27000 8280c9b4 ea6a9d9c ea6a9da0 ea6a9d70 80230af0 80239c10 9d60: 800b0013 ffffffff r5:800b0013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804e9c00>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e997c>] (__purge_vmap_area_lazy) from [<804e9fb8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea6a9dc0 r5:ea6a9e08 r4:ea6a9dc0 [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85657fc0 r4:00000000 [<804edab0>] (vfree) from [<80558908>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:854a8000 r7:00000000 r6:83018600 r5:00001000 r4:7f02d000 [<805588d8>] (execmem_free) from [<803c5e38>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfc99000 [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c61b0>] (bpf_jit_free) from [<803c72c0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:8580a38c r4:85659080 [<803c7180>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:8580a38c r4:85659080 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:854a8000 r8:856590ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85659080 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85659080 r8:80278fec r7:ea7b9e60 r6:85659180 r5:854a8000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea6a9fb0 to 0xea6a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85657dc0 INFO: task kworker/1:156:4821 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:156 state:D stack:0 pid:4821 tgid:4821 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63234>] (__schedule) from [<81a641c8>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a63234>] (__schedule) from [<81a641c8>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ea6b5d84 r9:00000002 r8:60000013 r7:829171a0 r6:ea6b5d8c r5:854abc00 r4:854abc00 [<81a6419c>] (schedule) from [<81a645b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:854abc00 r4:8291719c [<81a64598>] (schedule_preempt_disabled) from [<81a67160>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64598>] (schedule_preempt_disabled) from [<81a67160>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a66e10>] (__mutex_lock.constprop.0) from [<81a67908>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea6b5e08 r4:00000000 [<81a678f4>] (__mutex_lock_slowpath) from [<81a67948>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a6790c>] (mutex_lock) from [<804e9e3c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8564c2c0 r4:00000000 [<804edab0>] (vfree) from [<80558908>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:854abc00 r7:00000000 r6:83018600 r5:00001000 r4:7f049000 [<805588d8>] (execmem_free) from [<803c5e38>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea703000 [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c61b0>] (bpf_jit_free) from [<803c72c0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:8580878c r4:85659400 [<803c7180>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:8580878c r4:85659400 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:854abc00 r8:8565942c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85659400 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85659400 r8:80278fec r7:ea7d9e60 r6:85659480 r5:854abc00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea6b5fb0 to 0xea6b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:8563c880 INFO: task kworker/1:156:4821 is blocked on a mutex likely owned by task kworker/1:153:4815. task:kworker/1:153 state:R running task stack:0 pid:4815 tgid:4815 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63234>] (__schedule) from [<81a645fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:854a8000 r8:80200c04 r7:ea6a9d54 r6:ffffffff r5:854a8000 r4:00000000 [<81a645bc>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea6a9d20 to 0xea6a9d68) 9d20: e330b000 ebf27000 00000001 80239bf8 dfb67000 00000001 82acb1c4 82aca5a0 9d40: dfb67000 ebf27000 8280c9b4 ea6a9d9c ea6a9da0 ea6a9d70 80230af0 80239c10 9d60: 800b0013 ffffffff r5:800b0013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804e9c00>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e997c>] (__purge_vmap_area_lazy) from [<804e9fb8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea6a9dc0 r5:ea6a9e08 r4:ea6a9dc0 [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85657fc0 r4:00000000 [<804edab0>] (vfree) from [<80558908>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:854a8000 r7:00000000 r6:83018600 r5:00001000 r4:7f02d000 [<805588d8>] (execmem_free) from [<803c5e38>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfc99000 [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c61b0>] (bpf_jit_free) from [<803c72c0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:8580a38c r4:85659080 [<803c7180>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:8580a38c r4:85659080 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:854a8000 r8:856590ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85659080 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85659080 r8:80278fec r7:ea7b9e60 r6:85659180 r5:854a8000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea6a9fb0 to 0xea6a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85657dc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:157:4824 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:157 state:D stack:0 pid:4824 tgid:4824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63234>] (__schedule) from [<81a641c8>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a63234>] (__schedule) from [<81a641c8>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ea7add84 r9:00000002 r8:60000113 r7:829171a0 r6:ea7add8c r5:854ad400 r4:854ad400 [<81a6419c>] (schedule) from [<81a645b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:854ad400 r4:8291719c [<81a64598>] (schedule_preempt_disabled) from [<81a67160>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64598>] (schedule_preempt_disabled) from [<81a67160>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a66e10>] (__mutex_lock.constprop.0) from [<81a67908>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea7ade08 r4:00000000 [<81a678f4>] (__mutex_lock_slowpath) from [<81a67948>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a6790c>] (mutex_lock) from [<804e9e3c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85646b80 r4:00000000 [<804edab0>] (vfree) from [<80558908>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:854ad400 r7:00000000 r6:83018600 r5:00001000 r4:7f02f000 [<805588d8>] (execmem_free) from [<803c5e38>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfb21000 [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c61b0>] (bpf_jit_free) from [<803c72c0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:8580978c r4:85659580 [<803c7180>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:8580978c r4:85659580 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:854ad400 r8:856595ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85659580 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85659580 r8:80278fec r7:ea6b5e60 r6:8563e400 r5:854ad400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea7adfb0 to 0xea7adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85648000 INFO: task kworker/1:157:4824 is blocked on a mutex likely owned by task kworker/1:153:4815. task:kworker/1:153 state:R running task stack:0 pid:4815 tgid:4815 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63234>] (__schedule) from [<81a645fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:854a8000 r8:80200c04 r7:ea6a9d54 r6:ffffffff r5:854a8000 r4:00000000 [<81a645bc>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea6a9d20 to 0xea6a9d68) 9d20: e330b000 ebf27000 00000001 80239bf8 dfb67000 00000001 82acb1c4 82aca5a0 9d40: dfb67000 ebf27000 8280c9b4 ea6a9d9c ea6a9da0 ea6a9d70 80230af0 80239c10 9d60: 800b0013 ffffffff r5:800b0013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804e9c00>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e997c>] (__purge_vmap_area_lazy) from [<804e9fb8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea6a9dc0 r5:ea6a9e08 r4:ea6a9dc0 [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85657fc0 r4:00000000 [<804edab0>] (vfree) from [<80558908>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:854a8000 r7:00000000 r6:83018600 r5:00001000 r4:7f02d000 [<805588d8>] (execmem_free) from [<803c5e38>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfc99000 [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c61b0>] (bpf_jit_free) from [<803c72c0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:8580a38c r4:85659080 [<803c7180>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:8580a38c r4:85659080 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:854a8000 r8:856590ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85659080 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85659080 r8:80278fec r7:ea7b9e60 r6:85659180 r5:854a8000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea6a9fb0 to 0xea6a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85657dc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:158:4826 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:158 state:D stack:0 pid:4826 tgid:4826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63234>] (__schedule) from [<81a641c8>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a63234>] (__schedule) from [<81a641c8>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ea721d84 r9:00000002 r8:60000113 r7:829171a0 r6:ea721d8c r5:8579e000 r4:8579e000 [<81a6419c>] (schedule) from [<81a645b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:8579e000 r4:8291719c [<81a64598>] (schedule_preempt_disabled) from [<81a67160>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64598>] (schedule_preempt_disabled) from [<81a67160>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a66e10>] (__mutex_lock.constprop.0) from [<81a67908>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea721e08 r4:00000000 [<81a678f4>] (__mutex_lock_slowpath) from [<81a67948>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a6790c>] (mutex_lock) from [<804e9e3c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8563cb00 r4:00000000 [<804edab0>] (vfree) from [<80558908>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:8579e000 r7:00000000 r6:83018600 r5:00001000 r4:7f04b000 [<805588d8>] (execmem_free) from [<803c5e38>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea76b000 [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c61b0>] (bpf_jit_free) from [<803c72c0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85809b8c r4:85659600 [<803c7180>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:85809b8c r4:85659600 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:8579e000 r8:8565962c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85659600 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85659600 r8:80278fec r7:ea7ade60 r6:8563e480 r5:8579e000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea721fb0 to 0xea721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:8564c700 INFO: task kworker/1:158:4826 is blocked on a mutex likely owned by task kworker/1:153:4815. task:kworker/1:153 state:R running task stack:0 pid:4815 tgid:4815 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63234>] (__schedule) from [<81a645fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:854a8000 r8:80200c04 r7:ea6a9d54 r6:ffffffff r5:854a8000 r4:00000000 [<81a645bc>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea6a9d20 to 0xea6a9d68) 9d20: e330b000 ebf27000 00000001 80239bf8 dfb67000 00000001 82acb1c4 82aca5a0 9d40: dfb67000 ebf27000 8280c9b4 ea6a9d9c ea6a9da0 ea6a9d70 80230af0 80239c10 9d60: 800b0013 ffffffff r5:800b0013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804e9c00>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e997c>] (__purge_vmap_area_lazy) from [<804e9fb8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea6a9dc0 r5:ea6a9e08 r4:ea6a9dc0 [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85657fc0 r4:00000000 [<804edab0>] (vfree) from [<80558908>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:854a8000 r7:00000000 r6:83018600 r5:00001000 r4:7f02d000 [<805588d8>] (execmem_free) from [<803c5e38>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfc99000 [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c61b0>] (bpf_jit_free) from [<803c72c0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:8580a38c r4:85659080 [<803c7180>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:8580a38c r4:85659080 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:854a8000 r8:856590ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85659080 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85659080 r8:80278fec r7:ea7b9e60 r6:85659180 r5:854a8000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea6a9fb0 to 0xea6a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85657dc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:159:4828 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:159 state:D stack:0 pid:4828 tgid:4828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63234>] (__schedule) from [<81a641c8>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a63234>] (__schedule) from [<81a641c8>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ea701d84 r9:00000002 r8:60000113 r7:829171a0 r6:ea701d8c r5:854ae000 r4:854ae000 [<81a6419c>] (schedule) from [<81a645b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:854ae000 r4:8291719c [<81a64598>] (schedule_preempt_disabled) from [<81a67160>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64598>] (schedule_preempt_disabled) from [<81a67160>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a66e10>] (__mutex_lock.constprop.0) from [<81a67908>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea701e08 r4:00000000 [<81a678f4>] (__mutex_lock_slowpath) from [<81a67948>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a6790c>] (mutex_lock) from [<804e9e3c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85646600 r4:00000000 [<804edab0>] (vfree) from [<80558908>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:854ae000 r7:00000000 r6:83018600 r5:00001000 r4:7f00d000 [<805588d8>] (execmem_free) from [<803c5e38>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfa97000 [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c61b0>] (bpf_jit_free) from [<803c72c0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85808b8c r4:85659680 [<803c7180>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:85808b8c r4:85659680 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:854ae000 r8:856596ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85659680 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85659680 r8:80278fec r7:ea7ade60 r6:85659700 r5:854ae000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea701fb0 to 0xea701ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85649dc0 INFO: task kworker/1:159:4828 is blocked on a mutex likely owned by task kworker/1:153:4815. task:kworker/1:153 state:R running task stack:0 pid:4815 tgid:4815 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63234>] (__schedule) from [<81a645fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:854a8000 r8:80200c04 r7:ea6a9d54 r6:ffffffff r5:854a8000 r4:00000000 [<81a645bc>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea6a9d20 to 0xea6a9d68) 9d20: e330b000 ebf27000 00000001 80239bf8 dfb67000 00000001 82acb1c4 82aca5a0 9d40: dfb67000 ebf27000 8280c9b4 ea6a9d9c ea6a9da0 ea6a9d70 80230af0 80239c10 9d60: 800b0013 ffffffff r5:800b0013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804e9c00>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e997c>] (__purge_vmap_area_lazy) from [<804e9fb8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea6a9dc0 r5:ea6a9e08 r4:ea6a9dc0 [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85657fc0 r4:00000000 [<804edab0>] (vfree) from [<80558908>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:854a8000 r7:00000000 r6:83018600 r5:00001000 r4:7f02d000 [<805588d8>] (execmem_free) from [<803c5e38>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfc99000 [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c61b0>] (bpf_jit_free) from [<803c72c0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:8580a38c r4:85659080 [<803c7180>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:8580a38c r4:85659080 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:854a8000 r8:856590ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85659080 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85659080 r8:80278fec r7:ea7b9e60 r6:85659180 r5:854a8000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea6a9fb0 to 0xea6a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85657dc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:160:4831 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:160 state:D stack:0 pid:4831 tgid:4831 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63234>] (__schedule) from [<81a641c8>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a63234>] (__schedule) from [<81a641c8>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ea795d84 r9:00000002 r8:60000113 r7:829171a0 r6:ea795d8c r5:854ac800 r4:854ac800 [<81a6419c>] (schedule) from [<81a645b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:854ac800 r4:8291719c [<81a64598>] (schedule_preempt_disabled) from [<81a67160>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64598>] (schedule_preempt_disabled) from [<81a67160>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a66e10>] (__mutex_lock.constprop.0) from [<81a67908>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea795e08 r4:00000000 [<81a678f4>] (__mutex_lock_slowpath) from [<81a67948>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a6790c>] (mutex_lock) from [<804e9e3c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85648000 r4:00000000 [<804edab0>] (vfree) from [<80558908>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:854ac800 r7:00000000 r6:83018600 r5:00001000 r4:7f03b000 [<805588d8>] (execmem_free) from [<803c5e38>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea5b3000 [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c61b0>] (bpf_jit_free) from [<803c72c0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:8575478c r4:85659780 [<803c7180>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:8575478c r4:85659780 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:854ac800 r8:856597ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85659780 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85659780 r8:80278fec r7:ea7ade60 r6:85659800 r5:854ac800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea795fb0 to 0xea795ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85646580 INFO: task kworker/1:160:4831 is blocked on a mutex likely owned by task kworker/1:153:4815. task:kworker/1:153 state:R running task stack:0 pid:4815 tgid:4815 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63234>] (__schedule) from [<81a645fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:854a8000 r8:80200c04 r7:ea6a9d54 r6:ffffffff r5:854a8000 r4:00000000 [<81a645bc>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea6a9d20 to 0xea6a9d68) 9d20: e330b000 ebf27000 00000001 80239bf8 dfb67000 00000001 82acb1c4 82aca5a0 9d40: dfb67000 ebf27000 8280c9b4 ea6a9d9c ea6a9da0 ea6a9d70 80230af0 80239c10 9d60: 800b0013 ffffffff r5:800b0013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804e9c00>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e997c>] (__purge_vmap_area_lazy) from [<804e9fb8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea6a9dc0 r5:ea6a9e08 r4:ea6a9dc0 [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85657fc0 r4:00000000 [<804edab0>] (vfree) from [<80558908>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:854a8000 r7:00000000 r6:83018600 r5:00001000 r4:7f02d000 [<805588d8>] (execmem_free) from [<803c5e38>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfc99000 [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c61b0>] (bpf_jit_free) from [<803c72c0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:8580a38c r4:85659080 [<803c7180>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:8580a38c r4:85659080 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:854a8000 r8:856590ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85659080 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85659080 r8:80278fec r7:ea7b9e60 r6:85659180 r5:854a8000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea6a9fb0 to 0xea6a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85657dc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:161:4833 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:161 state:D stack:0 pid:4833 tgid:4833 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63234>] (__schedule) from [<81a641c8>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a63234>] (__schedule) from [<81a641c8>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ea799d84 r9:00000002 r8:60000013 r7:829171a0 r6:ea799d8c r5:854a8c00 r4:854a8c00 [<81a6419c>] (schedule) from [<81a645b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:854a8c00 r4:8291719c [<81a64598>] (schedule_preempt_disabled) from [<81a67160>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64598>] (schedule_preempt_disabled) from [<81a67160>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a66e10>] (__mutex_lock.constprop.0) from [<81a67908>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea799e08 r4:00000000 [<81a678f4>] (__mutex_lock_slowpath) from [<81a67948>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a6790c>] (mutex_lock) from [<804e9e3c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85646500 r4:00000000 [<804edab0>] (vfree) from [<80558908>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:854a8c00 r7:00000000 r6:83018600 r5:00001000 r4:7f035000 [<805588d8>] (execmem_free) from [<803c5e38>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:e0069000 [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c61b0>] (bpf_jit_free) from [<803c72c0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85754f8c r4:85659900 [<803c7180>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:85754f8c r4:85659900 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:854a8c00 r8:8565992c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85659900 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85659900 r8:80278fec r7:ea7ade60 r6:85659980 r5:854a8c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea799fb0 to 0xea799ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85646980 INFO: task kworker/1:161:4833 is blocked on a mutex likely owned by task kworker/1:153:4815. task:kworker/1:153 state:R running task stack:0 pid:4815 tgid:4815 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63234>] (__schedule) from [<81a645fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:854a8000 r8:80200c04 r7:ea6a9d54 r6:ffffffff r5:854a8000 r4:00000000 [<81a645bc>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea6a9d20 to 0xea6a9d68) 9d20: e330b000 ebf27000 00000001 80239bf8 dfb67000 00000001 82acb1c4 82aca5a0 9d40: dfb67000 ebf27000 8280c9b4 ea6a9d9c ea6a9da0 ea6a9d70 80230af0 80239c10 9d60: 800b0013 ffffffff r5:800b0013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804e9c00>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e997c>] (__purge_vmap_area_lazy) from [<804e9fb8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea6a9dc0 r5:ea6a9e08 r4:ea6a9dc0 [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85657fc0 r4:00000000 [<804edab0>] (vfree) from [<80558908>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:854a8000 r7:00000000 r6:83018600 r5:00001000 r4:7f02d000 [<805588d8>] (execmem_free) from [<803c5e38>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfc99000 [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c61b0>] (bpf_jit_free) from [<803c72c0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:8580a38c r4:85659080 [<803c7180>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:8580a38c r4:85659080 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:854a8000 r8:856590ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85659080 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85659080 r8:80278fec r7:ea7b9e60 r6:85659180 r5:854a8000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea6a9fb0 to 0xea6a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85657dc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:162:4835 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:162 state:D stack:0 pid:4835 tgid:4835 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63234>] (__schedule) from [<81a641c8>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a63234>] (__schedule) from [<81a641c8>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ea791d84 r9:00000002 r8:60000013 r7:829171a0 r6:ea791d8c r5:854aec00 r4:854aec00 [<81a6419c>] (schedule) from [<81a645b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:854aec00 r4:8291719c [<81a64598>] (schedule_preempt_disabled) from [<81a67160>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64598>] (schedule_preempt_disabled) from [<81a67160>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a66e10>] (__mutex_lock.constprop.0) from [<81a67908>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea791e08 r4:00000000 [<81a678f4>] (__mutex_lock_slowpath) from [<81a67948>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a6790c>] (mutex_lock) from [<804e9e3c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856a5300 r4:00000000 [<804edab0>] (vfree) from [<80558908>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:854aec00 r7:00000000 r6:83018600 r5:00001000 r4:7f039000 [<805588d8>] (execmem_free) from [<803c5e38>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea519000 [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c61b0>] (bpf_jit_free) from [<803c72c0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85809f8c r4:85659a00 [<803c7180>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:85809f8c r4:85659a00 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:854aec00 r8:85659a2c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85659a00 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85659a00 r8:80278fec r7:ea795e60 r6:85659a80 r5:854aec00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea791fb0 to 0xea791ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:856464c0 INFO: task kworker/1:162:4835 is blocked on a mutex likely owned by task kworker/1:153:4815. task:kworker/1:153 state:R running task stack:0 pid:4815 tgid:4815 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63234>] (__schedule) from [<81a645fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:854a8000 r8:80200c04 r7:ea6a9d54 r6:ffffffff r5:854a8000 r4:00000000 [<81a645bc>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea6a9d20 to 0xea6a9d68) 9d20: e330b000 ebf27000 00000001 80239bf8 dfb67000 00000001 82acb1c4 82aca5a0 9d40: dfb67000 ebf27000 8280c9b4 ea6a9d9c ea6a9da0 ea6a9d70 80230af0 80239c10 9d60: 800b0013 ffffffff r5:800b0013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804e9c00>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e997c>] (__purge_vmap_area_lazy) from [<804e9fb8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea6a9dc0 r5:ea6a9e08 r4:ea6a9dc0 [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85657fc0 r4:00000000 [<804edab0>] (vfree) from [<80558908>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:854a8000 r7:00000000 r6:83018600 r5:00001000 r4:7f02d000 [<805588d8>] (execmem_free) from [<803c5e38>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfc99000 [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c61b0>] (bpf_jit_free) from [<803c72c0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:8580a38c r4:85659080 [<803c7180>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:8580a38c r4:85659080 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:854a8000 r8:856590ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85659080 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85659080 r8:80278fec r7:ea7b9e60 r6:85659180 r5:854a8000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea6a9fb0 to 0xea6a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85657dc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:152:4837 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:152 state:D stack:0 pid:4837 tgid:4837 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63234>] (__schedule) from [<81a641c8>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a63234>] (__schedule) from [<81a641c8>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ea7b5d84 r9:00000002 r8:60000113 r7:829171a0 r6:ea7b5d8c r5:854aa400 r4:854aa400 [<81a6419c>] (schedule) from [<81a645b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:854aa400 r4:8291719c [<81a64598>] (schedule_preempt_disabled) from [<81a67160>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64598>] (schedule_preempt_disabled) from [<81a67160>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a66e10>] (__mutex_lock.constprop.0) from [<81a67908>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea7b5e08 r4:00000000 [<81a678f4>] (__mutex_lock_slowpath) from [<81a67948>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a6790c>] (mutex_lock) from [<804e9e3c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8563c880 r4:00000000 [<804edab0>] (vfree) from [<80558908>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:854aa400 r7:00000000 r6:83018400 r5:00001000 r4:7f043000 [<805588d8>] (execmem_free) from [<803c5e38>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea7e3000 [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c61b0>] (bpf_jit_free) from [<803c72c0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:857ccf8c r4:8563e500 [<803c7180>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:857ccf8c r4:8563e500 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:854aa400 r8:8563e52c r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:8563e500 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8563e500 r8:80278fec r7:ea719e60 r6:85659b00 r5:854aa400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea7b5fb0 to 0xea7b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:8563be40 INFO: task kworker/0:152:4837 is blocked on a mutex likely owned by task kworker/1:153:4815. task:kworker/1:153 state:R running task stack:0 pid:4815 tgid:4815 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63234>] (__schedule) from [<81a645fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:854a8000 r8:80200c04 r7:ea6a9d54 r6:ffffffff r5:854a8000 r4:00000000 [<81a645bc>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea6a9d20 to 0xea6a9d68) 9d20: e330b000 ebf27000 00000001 80239bf8 dfb67000 00000001 82acb1c4 82aca5a0 9d40: dfb67000 ebf27000 8280c9b4 ea6a9d9c ea6a9da0 ea6a9d70 80230af0 80239c10 9d60: 800b0013 ffffffff r5:800b0013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804e9c00>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e997c>] (__purge_vmap_area_lazy) from [<804e9fb8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea6a9dc0 r5:ea6a9e08 r4:ea6a9dc0 [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85657fc0 r4:00000000 [<804edab0>] (vfree) from [<80558908>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:854a8000 r7:00000000 r6:83018600 r5:00001000 r4:7f02d000 [<805588d8>] (execmem_free) from [<803c5e38>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfc99000 [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c61b0>] (bpf_jit_free) from [<803c72c0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:8580a38c r4:85659080 [<803c7180>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:8580a38c r4:85659080 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:854a8000 r8:856590ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85659080 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85659080 r8:80278fec r7:ea7b9e60 r6:85659180 r5:854a8000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea6a9fb0 to 0xea6a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85657dc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:163:4839 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:163 state:D stack:0 pid:4839 tgid:4839 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63234>] (__schedule) from [<81a641c8>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a63234>] (__schedule) from [<81a641c8>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ea7bdd84 r9:00000002 r8:60000013 r7:829171a0 r6:ea7bdd8c r5:857a0c00 r4:857a0c00 [<81a6419c>] (schedule) from [<81a645b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:857a0c00 r4:8291719c [<81a64598>] (schedule_preempt_disabled) from [<81a67160>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64598>] (schedule_preempt_disabled) from [<81a67160>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a66e10>] (__mutex_lock.constprop.0) from [<81a67908>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea7bde08 r4:00000000 [<81a678f4>] (__mutex_lock_slowpath) from [<81a67948>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a6790c>] (mutex_lock) from [<804e9e3c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85635780 r4:00000000 [<804edab0>] (vfree) from [<80558908>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:857a0c00 r7:00000000 r6:83018600 r5:00001000 r4:7f041000 [<805588d8>] (execmem_free) from [<803c5e38>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea643000 [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c61b0>] (bpf_jit_free) from [<803c72c0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:8580bb8c r4:85659c00 [<803c7180>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:8580bb8c r4:85659c00 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:857a0c00 r8:85659c2c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85659c00 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85659c00 r8:80278fec r7:ea795e60 r6:85659c80 r5:857a0c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea7bdfb0 to 0xea7bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:856a5340 INFO: task kworker/1:163:4839 is blocked on a mutex likely owned by task kworker/1:153:4815. task:kworker/1:153 state:R running task stack:0 pid:4815 tgid:4815 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63234>] (__schedule) from [<81a645fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:854a8000 r8:80200c04 r7:ea6a9d54 r6:ffffffff r5:854a8000 r4:00000000 [<81a645bc>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea6a9d20 to 0xea6a9d68) 9d20: e330b000 ebf27000 00000001 80239bf8 dfb67000 00000001 82acb1c4 82aca5a0 9d40: dfb67000 ebf27000 8280c9b4 ea6a9d9c ea6a9da0 ea6a9d70 80230af0 80239c10 9d60: 800b0013 ffffffff r5:800b0013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804e9c00>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e997c>] (__purge_vmap_area_lazy) from [<804e9fb8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea6a9dc0 r5:ea6a9e08 r4:ea6a9dc0 [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85657fc0 r4:00000000 [<804edab0>] (vfree) from [<80558908>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:854a8000 r7:00000000 r6:83018600 r5:00001000 r4:7f02d000 [<805588d8>] (execmem_free) from [<803c5e38>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfc99000 [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c61b0>] (bpf_jit_free) from [<803c72c0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:8580a38c r4:85659080 [<803c7180>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:8580a38c r4:85659080 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:854a8000 r8:856590ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85659080 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85659080 r8:80278fec r7:ea7b9e60 r6:85659180 r5:854a8000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea6a9fb0 to 0xea6a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85657dc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:153:4846 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:153 state:D stack:0 pid:4846 tgid:4846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63234>] (__schedule) from [<81a641c8>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a63234>] (__schedule) from [<81a641c8>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ea801d84 r9:00000002 r8:60000113 r7:829171a0 r6:ea801d8c r5:857a5400 r4:857a5400 [<81a6419c>] (schedule) from [<81a645b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:857a5400 r4:8291719c [<81a64598>] (schedule_preempt_disabled) from [<81a67160>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64598>] (schedule_preempt_disabled) from [<81a67160>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a66e10>] (__mutex_lock.constprop.0) from [<81a67908>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea801e08 r4:00000000 [<81a678f4>] (__mutex_lock_slowpath) from [<81a67948>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a6790c>] (mutex_lock) from [<804e9e3c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8563b200 r4:00000000 [<804edab0>] (vfree) from [<80558908>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:857a5400 r7:00000000 r6:83018400 r5:00001000 r4:7f02b000 [<805588d8>] (execmem_free) from [<803c5e38>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfc0f000 [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c61b0>] (bpf_jit_free) from [<803c72c0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:857e0b8c r4:8563e580 [<803c7180>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:857e0b8c r4:8563e580 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:857a5400 r8:8563e5ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:8563e580 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8563e580 r8:80278fec r7:ea719e60 r6:85659500 r5:857a5400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea801fb0 to 0xea801ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:84a55500 INFO: task kworker/0:153:4846 is blocked on a mutex likely owned by task kworker/1:153:4815. task:kworker/1:153 state:R running task stack:0 pid:4815 tgid:4815 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63234>] (__schedule) from [<81a645fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:854a8000 r8:80200c04 r7:ea6a9d54 r6:ffffffff r5:854a8000 r4:00000000 [<81a645bc>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea6a9d20 to 0xea6a9d68) 9d20: e330b000 ebf27000 00000001 80239bf8 dfb67000 00000001 82acb1c4 82aca5a0 9d40: dfb67000 ebf27000 8280c9b4 ea6a9d9c ea6a9da0 ea6a9d70 80230af0 80239c10 9d60: 800b0013 ffffffff r5:800b0013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804e9c00>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e997c>] (__purge_vmap_area_lazy) from [<804e9fb8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea6a9dc0 r5:ea6a9e08 r4:ea6a9dc0 [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85657fc0 r4:00000000 [<804edab0>] (vfree) from [<80558908>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:854a8000 r7:00000000 r6:83018600 r5:00001000 r4:7f02d000 [<805588d8>] (execmem_free) from [<803c5e38>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfc99000 [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c61b0>] (bpf_jit_free) from [<803c72c0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:8580a38c r4:85659080 [<803c7180>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:8580a38c r4:85659080 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:854a8000 r8:856590ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85659080 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85659080 r8:80278fec r7:ea7b9e60 r6:85659180 r5:854a8000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea6a9fb0 to 0xea6a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85657dc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:154:4849 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:154 state:D stack:0 pid:4849 tgid:4849 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63234>] (__schedule) from [<81a641c8>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a63234>] (__schedule) from [<81a641c8>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ea6e9d84 r9:00000002 r8:60000013 r7:829171a0 r6:ea6e9d8c r5:857a6000 r4:857a6000 [<81a6419c>] (schedule) from [<81a645b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:857a6000 r4:8291719c [<81a64598>] (schedule_preempt_disabled) from [<81a67160>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64598>] (schedule_preempt_disabled) from [<81a67160>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a66e10>] (__mutex_lock.constprop.0) from [<81a67908>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea6e9e08 r4:00000000 [<81a678f4>] (__mutex_lock_slowpath) from [<81a67948>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a6790c>] (mutex_lock) from [<804e9e3c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85517b80 r4:00000000 [<804edab0>] (vfree) from [<80558908>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:857a6000 r7:00000000 r6:83018400 r5:00001000 r4:7f033000 [<805588d8>] (execmem_free) from [<803c5e38>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:e8333000 [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c61b0>] (bpf_jit_free) from [<803c72c0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:857e1f8c r4:8563e680 [<803c7180>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:857e1f8c r4:8563e680 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:857a6000 r8:8563e6ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:8563e680 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8563e680 r8:80278fec r7:ea719e60 r6:856a0000 r5:857a6000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea6e9fb0 to 0xea6e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85658840 INFO: task kworker/0:154:4849 is blocked on a mutex likely owned by task kworker/1:153:4815. task:kworker/1:153 state:R running task stack:0 pid:4815 tgid:4815 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63234>] (__schedule) from [<81a645fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:854a8000 r8:80200c04 r7:ea6a9d54 r6:ffffffff r5:854a8000 r4:00000000 [<81a645bc>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea6a9d20 to 0xea6a9d68) 9d20: e330b000 ebf27000 00000001 80239bf8 dfb67000 00000001 82acb1c4 82aca5a0 9d40: dfb67000 ebf27000 8280c9b4 ea6a9d9c ea6a9da0 ea6a9d70 80230af0 80239c10 9d60: 800b0013 ffffffff r5:800b0013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804e9c00>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e997c>] (__purge_vmap_area_lazy) from [<804e9fb8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea6a9dc0 r5:ea6a9e08 r4:ea6a9dc0 [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85657fc0 r4:00000000 [<804edab0>] (vfree) from [<80558908>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:854a8000 r7:00000000 r6:83018600 r5:00001000 r4:7f02d000 [<805588d8>] (execmem_free) from [<803c5e38>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfc99000 [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c61b0>] (bpf_jit_free) from [<803c72c0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:8580a38c r4:85659080 [<803c7180>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:8580a38c r4:85659080 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:854a8000 r8:856590ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85659080 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85659080 r8:80278fec r7:ea7b9e60 r6:85659180 r5:854a8000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea6a9fb0 to 0xea6a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85657dc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:155:4852 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:155 state:D stack:0 pid:4852 tgid:4852 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63234>] (__schedule) from [<81a641c8>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a63234>] (__schedule) from [<81a641c8>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ea6f1d84 r9:00000002 r8:60000013 r7:829171a0 r6:ea6f1d8c r5:857a6c00 r4:857a6c00 [<81a6419c>] (schedule) from [<81a645b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:857a6c00 r4:8291719c [<81a64598>] (schedule_preempt_disabled) from [<81a67160>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64598>] (schedule_preempt_disabled) from [<81a67160>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a66e10>] (__mutex_lock.constprop.0) from [<81a67908>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea6f1e08 r4:00000000 [<81a678f4>] (__mutex_lock_slowpath) from [<81a67948>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a6790c>] (mutex_lock) from [<804e9e3c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85650dc0 r4:00000000 [<804edab0>] (vfree) from [<80558908>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:857a6c00 r7:00000000 r6:83018400 r5:00001000 r4:7f03d000 [<805588d8>] (execmem_free) from [<803c5e38>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea3cb000 [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c61b0>] (bpf_jit_free) from [<803c72c0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:857e238c r4:8563e700 [<803c7180>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:857e238c r4:8563e700 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:857a6c00 r8:8563e72c r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:8563e700 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8563e700 r8:80278fec r7:ea6e9e60 r6:856a0180 r5:857a6c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea6f1fb0 to 0xea6f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85646400 INFO: task kworker/0:155:4852 is blocked on a mutex likely owned by task kworker/1:153:4815. task:kworker/1:153 state:R running task stack:0 pid:4815 tgid:4815 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63234>] (__schedule) from [<81a645fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:854a8000 r8:80200c04 r7:ea6a9d54 r6:ffffffff r5:854a8000 r4:00000000 [<81a645bc>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea6a9d20 to 0xea6a9d68) 9d20: e330b000 ebf27000 00000001 80239bf8 dfb67000 00000001 82acb1c4 82aca5a0 9d40: dfb67000 ebf27000 8280c9b4 ea6a9d9c ea6a9da0 ea6a9d70 80230af0 80239c10 9d60: 800b0013 ffffffff r5:800b0013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804e9c00>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e997c>] (__purge_vmap_area_lazy) from [<804e9fb8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea6a9dc0 r5:ea6a9e08 r4:ea6a9dc0 [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85657fc0 r4:00000000 [<804edab0>] (vfree) from [<80558908>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:854a8000 r7:00000000 r6:83018600 r5:00001000 r4:7f02d000 [<805588d8>] (execmem_free) from [<803c5e38>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfc99000 [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c61b0>] (bpf_jit_free) from [<803c72c0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:8580a38c r4:85659080 [<803c7180>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:8580a38c r4:85659080 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:854a8000 r8:856590ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85659080 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85659080 r8:80278fec r7:ea7b9e60 r6:85659180 r5:854a8000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea6a9fb0 to 0xea6a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85657dc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:156:4853 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:156 state:D stack:0 pid:4853 tgid:4853 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63234>] (__schedule) from [<81a641c8>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a63234>] (__schedule) from [<81a641c8>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ea6f5d84 r9:00000002 r8:60000113 r7:829171a0 r6:ea6f5d8c r5:857a3c00 r4:857a3c00 [<81a6419c>] (schedule) from [<81a645b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:857a3c00 r4:8291719c [<81a64598>] (schedule_preempt_disabled) from [<81a67160>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64598>] (schedule_preempt_disabled) from [<81a67160>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a66e10>] (__mutex_lock.constprop.0) from [<81a67908>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea6f5e08 r4:00000000 [<81a678f4>] (__mutex_lock_slowpath) from [<81a67948>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a6790c>] (mutex_lock) from [<804e9e3c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85658680 r4:00000000 [<804edab0>] (vfree) from [<80558908>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:857a3c00 r7:00000000 r6:83018400 r5:00001000 r4:7f031000 [<805588d8>] (execmem_free) from [<803c5e38>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:e0177000 [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c61b0>] (bpf_jit_free) from [<803c72c0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:857e1b8c r4:8563e780 [<803c7180>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:857e1b8c r4:8563e780 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:857a3c00 r8:8563e7ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:8563e780 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8563e780 r8:80278fec r7:ea6e9e60 r6:856a0200 r5:857a3c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea6f5fb0 to 0xea6f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85646400 INFO: task kworker/0:156:4853 is blocked on a mutex likely owned by task kworker/1:153:4815. task:kworker/1:153 state:R running task stack:0 pid:4815 tgid:4815 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63234>] (__schedule) from [<81a645fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:854a8000 r8:80200c04 r7:ea6a9d54 r6:ffffffff r5:854a8000 r4:00000000 [<81a645bc>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea6a9d20 to 0xea6a9d68) 9d20: e330b000 ebf27000 00000001 80239bf8 dfb67000 00000001 82acb1c4 82aca5a0 9d40: dfb67000 ebf27000 8280c9b4 ea6a9d9c ea6a9da0 ea6a9d70 80230af0 80239c10 9d60: 800b0013 ffffffff r5:800b0013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804e9c00>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e997c>] (__purge_vmap_area_lazy) from [<804e9fb8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea6a9dc0 r5:ea6a9e08 r4:ea6a9dc0 [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9dd4>] (_vm_unmap_aliases) from [<804edc1c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85657fc0 r4:00000000 [<804edab0>] (vfree) from [<80558908>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:854a8000 r7:00000000 r6:83018600 r5:00001000 r4:7f02d000 [<805588d8>] (execmem_free) from [<803c5e38>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfc99000 [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5e28>] (bpf_jit_free_exec) from [<803c6218>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c61b0>] (bpf_jit_free) from [<803c72c0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:8580a38c r4:85659080 [<803c7180>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:8580a38c r4:85659080 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:854a8000 r8:856590ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85659080 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85659080 r8:80278fec r7:ea7b9e60 r6:85659180 r5:854a8000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea6a9fb0 to 0xea6a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85657dc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 30 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT Hardware name: ARM-Versatile Express Call trace: [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c arch/arm/kernel/traps.c:257) r7:00000000 r6:000d0013 r5:600d0093 r4:82252488 [<80201b08>] (show_stack) from [<8021f93c>] (__dump_stack lib/dump_stack.c:94 [inline]) [<80201b08>] (show_stack) from [<8021f93c>] (dump_stack_lvl+0x70/0x7c lib/dump_stack.c:120) [<8021f8cc>] (dump_stack_lvl) from [<8021f960>] (dump_stack+0x18/0x1c lib/dump_stack.c:129) r5:00000000 r4:00000001 [<8021f948>] (dump_stack) from [<81a4ce4c>] (nmi_cpu_backtrace+0x160/0x17c lib/nmi_backtrace.c:113) [<81a4ccec>] (nmi_cpu_backtrace) from [<81a4cf98>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8 lib/nmi_backtrace.c:62) r7:00000000 r6:8280c690 r5:8281ae34 r4:ffffffff [<81a4ce68>] (nmi_trigger_cpumask_backtrace) from [<802304fc>] (arch_trigger_cpumask_backtrace+0x18/0x1c arch/arm/kernel/smp.c:852) r9:8281ba28 r8:8280c810 r7:0001c501 r6:00007bec r5:82abf7d4 r4:84a0b50c [<802304e4>] (arch_trigger_cpumask_backtrace) from [<8037f9a8>] (trigger_all_cpu_backtrace include/linux/nmi.h:160 [inline]) [<802304e4>] (arch_trigger_cpumask_backtrace) from [<8037f9a8>] (check_hung_uninterruptible_tasks kernel/hung_task.c:332 [inline]) [<802304e4>] (arch_trigger_cpumask_backtrace) from [<8037f9a8>] (watchdog+0x5d0/0x850 kernel/hung_task.c:495) [<8037f3d8>] (watchdog) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:00000000 r8:8037f3d8 r7:832a2e00 r6:832a2e00 r5:832e3000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf8d9fb0 to 0xdf8d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:833d4300 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 2820 Comm: pr/ttyAMA-1 Not tainted syzkaller #0 PREEMPT Hardware name: ARM-Versatile Express PC is at __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:152 [inline] PC is at _raw_spin_unlock_irqrestore+0x28/0x54 kernel/locking/spinlock.c:194 LR is at spin_unlock_irqrestore include/linux/spinlock.h:406 [inline] LR is at __uart_port_unlock_irqrestore include/linux/serial_core.h:616 [inline] LR is at pl011_console_device_unlock+0x20/0x24 drivers/tty/serial/amba-pl011.c:2603 pc : [<81a6d09c>] lr : [<80a8eea8>] psr: 600b0113 sp : eaf2deb0 ip : eaf2dec0 fp : eaf2debc r10: 82959554 r9 : 00000001 r8 : 00000000 r7 : 00000117 r6 : 829594b8 r5 : 00000000 r4 : 00000001 r3 : 00000958 r2 : 00000000 r1 : 600b0113 r0 : 84031840 Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none Control: 30c5387d Table: 84964c40 DAC: 00000000 Call trace: [<81a6d074>] (_raw_spin_unlock_irqrestore) from [<80a8eea8>] (spin_unlock_irqrestore include/linux/spinlock.h:406 [inline]) [<81a6d074>] (_raw_spin_unlock_irqrestore) from [<80a8eea8>] (__uart_port_unlock_irqrestore include/linux/serial_core.h:616 [inline]) [<81a6d074>] (_raw_spin_unlock_irqrestore) from [<80a8eea8>] (pl011_console_device_unlock+0x20/0x24 drivers/tty/serial/amba-pl011.c:2603) [<80a8ee88>] (pl011_console_device_unlock) from [<802e3660>] (nbcon_emit_one+0x88/0x100 kernel/printk/nbcon.c:1142) [<802e35d8>] (nbcon_emit_one) from [<802e3880>] (nbcon_kthread_func+0x1a8/0x2a4 kernel/printk/nbcon.c:1229) r6:8280c690 r5:84c1c800 r4:829594b8 [<802e36d8>] (nbcon_kthread_func) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:829594b8 r8:802e36d8 r7:8483f400 r6:8483f400 r5:84c1c800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf2dfb0 to 0xeaf2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:847cd3c0