INFO: task kworker/0:9:4037 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:9 state:D stack:0 pid:4037 tgid:4037 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6441c>] (__schedule) from [<81a653b0>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a6441c>] (__schedule) from [<81a653b0>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:dfc8dd84 r9:00000002 r8:60000013 r7:829171a0 r6:dfc8dd8c r5:84b34800 r4:84b34800 [<81a65384>] (schedule) from [<81a65798>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:84b34800 r4:8291719c [<81a65780>] (schedule_preempt_disabled) from [<81a68348>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65780>] (schedule_preempt_disabled) from [<81a68348>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67ff8>] (__mutex_lock.constprop.0) from [<81a68af0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc8de08 r4:00000000 [<81a68adc>] (__mutex_lock_slowpath) from [<81a68b30>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68af4>] (mutex_lock) from [<804ea37c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ec7e00 r4:00000000 [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:84b34800 r7:00000000 r6:83018400 r5:00001000 r4:7f011000 [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfca9000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:852ee78c r4:84943c00 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:852ee78c r4:84943c00 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84b34800 r8:84943c2c r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:84943c00 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84943c00 r8:80278fec r7:dfcbde60 r6:848fcc80 r5:84b34800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc8dfb0 to 0xdfc8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:84ee0b80 INFO: task kworker/0:9:4037 is blocked on a mutex likely owned by task kworker/1:55:4553. task:kworker/1:55 state:R running task stack:0 pid:4553 tgid:4553 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6441c>] (__schedule) from [<81a657e4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:83b41800 r8:80200c04 r7:e01b9d54 r6:ffffffff r5:83b41800 r4:00000000 [<81a657a4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xe01b9d20 to 0xe01b9d68) 9d20: 9a7cc000 eaf4b000 00000001 80239bf8 7f011000 00000001 82acb1c4 82aca5a0 9d40: 7f011000 eaf4b000 8280c9b4 e01b9d9c e01b9da0 e01b9d70 80230af0 80239c10 9d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea140>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9ebc>] (__purge_vmap_area_lazy) from [<804ea4f8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e01b9dc0 r5:e01b9e08 r4:e01b9dc0 [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853344c0 r4:00000000 [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:83b41800 r7:00000000 r6:83018600 r5:00001000 r4:7f033000 [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:e01e7000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84f7cb8c r4:85331f00 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84f7cb8c r4:85331f00 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:83b41800 r8:85331f2c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85331f00 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85331f00 r8:80278fec r7:df959e60 r6:85331f80 r5:83b41800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe01b9fb0 to 0xe01b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:84e0e300 INFO: task kworker/0:12:4060 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:12 state:D stack:0 pid:4060 tgid:4060 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6441c>] (__schedule) from [<81a653b0>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a6441c>] (__schedule) from [<81a653b0>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:e0055d84 r9:00000002 r8:60000113 r7:829171a0 r6:e0055d8c r5:83bd5400 r4:83bd5400 [<81a65384>] (schedule) from [<81a65798>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:83bd5400 r4:8291719c [<81a65780>] (schedule_preempt_disabled) from [<81a68348>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65780>] (schedule_preempt_disabled) from [<81a68348>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67ff8>] (__mutex_lock.constprop.0) from [<81a68af0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0055e08 r4:00000000 [<81a68adc>] (__mutex_lock_slowpath) from [<81a68b30>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68af4>] (mutex_lock) from [<804ea37c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85334440 r4:00000000 [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:83bd5400 r7:00000000 r6:83018400 r5:00001000 r4:7f00f000 [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:e0273000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:8526d78c r4:849e7480 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:8526d78c r4:849e7480 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:83bd5400 r8:849e74ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:849e7480 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:849e7480 r8:80278fec r7:dfc8de60 r6:849e7500 r5:83bd5400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0055fb0 to 0xe0055ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:849f1180 INFO: task kworker/0:12:4060 is blocked on a mutex likely owned by task kworker/1:55:4553. task:kworker/1:55 state:R running task stack:0 pid:4553 tgid:4553 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6441c>] (__schedule) from [<81a657e4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:83b41800 r8:80200c04 r7:e01b9d54 r6:ffffffff r5:83b41800 r4:00000000 [<81a657a4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xe01b9d20 to 0xe01b9d68) 9d20: 9dcc2000 eaf4b000 00000001 80239bf8 7f011000 00000001 82acb1c4 82aca5a0 9d40: 7f011000 eaf4b000 8280c9b4 e01b9d9c e01b9da0 e01b9d70 80230af0 80239c10 9d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea140>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9ebc>] (__purge_vmap_area_lazy) from [<804ea4f8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e01b9dc0 r5:e01b9e08 r4:e01b9dc0 [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853344c0 r4:00000000 [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:83b41800 r7:00000000 r6:83018600 r5:00001000 r4:7f033000 [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:e01e7000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84f7cb8c r4:85331f00 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84f7cb8c r4:85331f00 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:83b41800 r8:85331f2c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85331f00 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85331f00 r8:80278fec r7:df959e60 r6:85331f80 r5:83b41800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe01b9fb0 to 0xe01b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:84e0e300 INFO: task kworker/0:13:4065 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:13 state:D stack:0 pid:4065 tgid:4065 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6441c>] (__schedule) from [<81a653b0>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a6441c>] (__schedule) from [<81a653b0>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:e01c9d84 r9:00000002 r8:60000113 r7:829171a0 r6:e01c9d8c r5:83bcec00 r4:83bcec00 [<81a65384>] (schedule) from [<81a65798>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:83bcec00 r4:8291719c [<81a65780>] (schedule_preempt_disabled) from [<81a68348>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65780>] (schedule_preempt_disabled) from [<81a68348>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67ff8>] (__mutex_lock.constprop.0) from [<81a68af0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e01c9e08 r4:00000000 [<81a68adc>] (__mutex_lock_slowpath) from [<81a68b30>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68af4>] (mutex_lock) from [<804ea37c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85341200 r4:00000000 [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:83bcec00 r7:00000000 r6:83018400 r5:00001000 r4:7f02d000 [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:e00c3000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:852abb8c r4:849e7680 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:852abb8c r4:849e7680 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:83bcec00 r8:849e76ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:849e7680 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:849e7680 r8:80278fec r7:dfc8de60 r6:849e7400 r5:83bcec00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe01c9fb0 to 0xe01c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:849f1480 INFO: task kworker/0:13:4065 is blocked on a mutex likely owned by task kworker/1:55:4553. task:kworker/1:55 state:R running task stack:0 pid:4553 tgid:4553 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6441c>] (__schedule) from [<81a657e4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:83b41800 r8:80200c04 r7:e01b9d54 r6:ffffffff r5:83b41800 r4:00000000 [<81a657a4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xe01b9d20 to 0xe01b9d68) 9d20: 9dcc2000 eaf4b000 00000001 80239bf8 7f011000 00000001 82acb1c4 82aca5a0 9d40: 7f011000 eaf4b000 8280c9b4 e01b9d9c e01b9da0 e01b9d70 80230af0 80239c10 9d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea140>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9ebc>] (__purge_vmap_area_lazy) from [<804ea4f8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e01b9dc0 r5:e01b9e08 r4:e01b9dc0 [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853344c0 r4:00000000 [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:83b41800 r7:00000000 r6:83018600 r5:00001000 r4:7f033000 [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:e01e7000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84f7cb8c r4:85331f00 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84f7cb8c r4:85331f00 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:83b41800 r8:85331f2c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85331f00 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85331f00 r8:80278fec r7:df959e60 r6:85331f80 r5:83b41800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe01b9fb0 to 0xe01b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:84e0e300 INFO: task kworker/0:14:4068 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:14 state:D stack:0 pid:4068 tgid:4068 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6441c>] (__schedule) from [<81a653b0>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a6441c>] (__schedule) from [<81a653b0>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:e01d9d84 r9:00000002 r8:60000013 r7:829171a0 r6:e01d9d8c r5:83bc8c00 r4:83bc8c00 [<81a65384>] (schedule) from [<81a65798>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:83bc8c00 r4:8291719c [<81a65780>] (schedule_preempt_disabled) from [<81a68348>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65780>] (schedule_preempt_disabled) from [<81a68348>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67ff8>] (__mutex_lock.constprop.0) from [<81a68af0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e01d9e08 r4:00000000 [<81a68adc>] (__mutex_lock_slowpath) from [<81a68b30>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68af4>] (mutex_lock) from [<804ea37c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e0e380 r4:00000000 [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:83bc8c00 r7:00000000 r6:83018400 r5:00001000 r4:7f00f000 [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfbab000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:852efb8c r4:849e7900 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:852efb8c r4:849e7900 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:83bc8c00 r8:849e792c r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:849e7900 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:849e7900 r8:80278fec r7:e01c9e60 r6:849e7980 r5:83bc8c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe01d9fb0 to 0xe01d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:849f1900 INFO: task kworker/0:14:4068 is blocked on a mutex likely owned by task kworker/1:55:4553. task:kworker/1:55 state:R running task stack:0 pid:4553 tgid:4553 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6441c>] (__schedule) from [<81a657e4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:83b41800 r8:80200c04 r7:e01b9d54 r6:ffffffff r5:83b41800 r4:00000000 [<81a657a4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xe01b9d20 to 0xe01b9d68) 9d20: 9dcc2000 eaf4b000 00000001 80239bf8 7f011000 00000001 82acb1c4 82aca5a0 9d40: 7f011000 eaf4b000 8280c9b4 e01b9d9c e01b9da0 e01b9d70 80230af0 80239c10 9d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea140>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9ebc>] (__purge_vmap_area_lazy) from [<804ea4f8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e01b9dc0 r5:e01b9e08 r4:e01b9dc0 [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853344c0 r4:00000000 [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:83b41800 r7:00000000 r6:83018600 r5:00001000 r4:7f033000 [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:e01e7000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84f7cb8c r4:85331f00 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84f7cb8c r4:85331f00 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:83b41800 r8:85331f2c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85331f00 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85331f00 r8:80278fec r7:df959e60 r6:85331f80 r5:83b41800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe01b9fb0 to 0xe01b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:84e0e300 INFO: task kworker/0:15:4072 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:15 state:D stack:0 pid:4072 tgid:4072 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6441c>] (__schedule) from [<81a653b0>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a6441c>] (__schedule) from [<81a653b0>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:e0225d84 r9:00000002 r8:60000113 r7:829171a0 r6:e0225d8c r5:83bcbc00 r4:83bcbc00 [<81a65384>] (schedule) from [<81a65798>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:83bcbc00 r4:8291719c [<81a65780>] (schedule_preempt_disabled) from [<81a68348>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65780>] (schedule_preempt_disabled) from [<81a68348>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67ff8>] (__mutex_lock.constprop.0) from [<81a68af0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0225e08 r4:00000000 [<81a68adc>] (__mutex_lock_slowpath) from [<81a68b30>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68af4>] (mutex_lock) from [<804ea37c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85341440 r4:00000000 [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:83bcbc00 r7:00000000 r6:83018400 r5:00001000 r4:7f029000 [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:df93d000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:852aaf8c r4:849e7800 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:852aaf8c r4:849e7800 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:83bcbc00 r8:849e782c r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:849e7800 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:849e7800 r8:80278fec r7:e01c9e60 r6:849e7880 r5:83bcbc00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0225fb0 to 0xe0225ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:849f1b80 INFO: task kworker/0:15:4072 is blocked on a mutex likely owned by task kworker/1:55:4553. task:kworker/1:55 state:R running task stack:0 pid:4553 tgid:4553 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6441c>] (__schedule) from [<81a657e4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:83b41800 r8:80200c04 r7:e01b9d54 r6:ffffffff r5:83b41800 r4:00000000 [<81a657a4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xe01b9d20 to 0xe01b9d68) 9d20: 9dcc2000 eaf4b000 00000001 80239bf8 7f011000 00000001 82acb1c4 82aca5a0 9d40: 7f011000 eaf4b000 8280c9b4 e01b9d9c e01b9da0 e01b9d70 80230af0 80239c10 9d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea140>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9ebc>] (__purge_vmap_area_lazy) from [<804ea4f8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e01b9dc0 r5:e01b9e08 r4:e01b9dc0 [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853344c0 r4:00000000 [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:83b41800 r7:00000000 r6:83018600 r5:00001000 r4:7f033000 [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:e01e7000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84f7cb8c r4:85331f00 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84f7cb8c r4:85331f00 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:83b41800 r8:85331f2c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85331f00 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85331f00 r8:80278fec r7:df959e60 r6:85331f80 r5:83b41800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe01b9fb0 to 0xe01b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:84e0e300 INFO: task kworker/1:57:4575 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:57 state:D stack:0 pid:4575 tgid:4575 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6441c>] (__schedule) from [<81a653b0>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a6441c>] (__schedule) from [<81a653b0>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:e832dd84 r9:00000002 r8:60000113 r7:829171a0 r6:e832dd8c r5:85312400 r4:85312400 [<81a65384>] (schedule) from [<81a65798>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:85312400 r4:8291719c [<81a65780>] (schedule_preempt_disabled) from [<81a68348>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65780>] (schedule_preempt_disabled) from [<81a68348>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67ff8>] (__mutex_lock.constprop.0) from [<81a68af0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e832de08 r4:00000000 [<81a68adc>] (__mutex_lock_slowpath) from [<81a68b30>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68af4>] (mutex_lock) from [<804ea37c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846f2d00 r4:00000000 [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:85312400 r7:00000000 r6:83018600 r5:00001000 r4:7f011000 [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfb91000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:852e578c r4:84182780 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:852e578c r4:84182780 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85312400 r8:841827ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:84182780 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84182780 r8:80278fec r7:e01b9e60 r6:84178380 r5:85312400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe832dfb0 to 0xe832dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:852f6600 INFO: task kworker/1:57:4575 is blocked on a mutex likely owned by task kworker/1:55:4553. task:kworker/1:55 state:R running task stack:0 pid:4553 tgid:4553 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6441c>] (__schedule) from [<81a657e4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:83b41800 r8:80200c04 r7:e01b9d54 r6:ffffffff r5:83b41800 r4:00000000 [<81a657a4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xe01b9d20 to 0xe01b9d68) 9d20: 9dcc2000 eaf4b000 00000001 80239bf8 7f011000 00000001 82acb1c4 82aca5a0 9d40: 7f011000 eaf4b000 8280c9b4 e01b9d9c e01b9da0 e01b9d70 80230af0 80239c10 9d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea140>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9ebc>] (__purge_vmap_area_lazy) from [<804ea4f8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e01b9dc0 r5:e01b9e08 r4:e01b9dc0 [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853344c0 r4:00000000 [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:83b41800 r7:00000000 r6:83018600 r5:00001000 r4:7f033000 [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:e01e7000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84f7cb8c r4:85331f00 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84f7cb8c r4:85331f00 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:83b41800 r8:85331f2c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85331f00 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85331f00 r8:80278fec r7:df959e60 r6:85331f80 r5:83b41800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe01b9fb0 to 0xe01b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:84e0e300 INFO: task kworker/1:61:4593 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:61 state:D stack:0 pid:4593 tgid:4593 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6441c>] (__schedule) from [<81a653b0>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a6441c>] (__schedule) from [<81a653b0>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:e0179d84 r9:00000002 r8:60000113 r7:829171a0 r6:e0179d8c r5:85310000 r4:85310000 [<81a65384>] (schedule) from [<81a65798>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:85310000 r4:8291719c [<81a65780>] (schedule_preempt_disabled) from [<81a68348>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65780>] (schedule_preempt_disabled) from [<81a68348>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67ff8>] (__mutex_lock.constprop.0) from [<81a68af0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0179e08 r4:00000000 [<81a68adc>] (__mutex_lock_slowpath) from [<81a68b30>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68af4>] (mutex_lock) from [<804ea37c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84960440 r4:00000000 [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:85310000 r7:00000000 r6:83018600 r5:00001000 r4:7f02f000 [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfc5f000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:8529638c r4:85337100 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:8529638c r4:85337100 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85310000 r8:8533712c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85337100 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85337100 r8:80278fec r7:e01b9e60 r6:85337180 r5:85310000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0179fb0 to 0xe0179ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85334480 INFO: task kworker/1:61:4593 is blocked on a mutex likely owned by task kworker/1:55:4553. task:kworker/1:55 state:R running task stack:0 pid:4553 tgid:4553 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6441c>] (__schedule) from [<81a657e4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:83b41800 r8:80200c04 r7:e01b9d54 r6:ffffffff r5:83b41800 r4:00000000 [<81a657a4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xe01b9d20 to 0xe01b9d68) 9d20: 9dcc2000 eaf4b000 00000001 80239bf8 7f011000 00000001 82acb1c4 82aca5a0 9d40: 7f011000 eaf4b000 8280c9b4 e01b9d9c e01b9da0 e01b9d70 80230af0 80239c10 9d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea140>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9ebc>] (__purge_vmap_area_lazy) from [<804ea4f8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e01b9dc0 r5:e01b9e08 r4:e01b9dc0 [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853344c0 r4:00000000 [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:83b41800 r7:00000000 r6:83018600 r5:00001000 r4:7f033000 [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:e01e7000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84f7cb8c r4:85331f00 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84f7cb8c r4:85331f00 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:83b41800 r8:85331f2c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85331f00 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85331f00 r8:80278fec r7:df959e60 r6:85331f80 r5:83b41800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe01b9fb0 to 0xe01b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:84e0e300 INFO: task kworker/1:62:4596 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:62 state:D stack:0 pid:4596 tgid:4596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6441c>] (__schedule) from [<81a653b0>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a6441c>] (__schedule) from [<81a653b0>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ea4e9d84 r9:00000002 r8:60000113 r7:829171a0 r6:ea4e9d8c r5:85313000 r4:85313000 [<81a65384>] (schedule) from [<81a65798>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:85313000 r4:8291719c [<81a65780>] (schedule_preempt_disabled) from [<81a68348>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65780>] (schedule_preempt_disabled) from [<81a68348>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67ff8>] (__mutex_lock.constprop.0) from [<81a68af0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea4e9e08 r4:00000000 [<81a68adc>] (__mutex_lock_slowpath) from [<81a68b30>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68af4>] (mutex_lock) from [<804ea37c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8533d580 r4:00000000 [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:85313000 r7:00000000 r6:83018600 r5:00001000 r4:7f033000 [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:e0181000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:852a8b8c r4:85337280 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:852a8b8c r4:85337280 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85313000 r8:853372ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85337280 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85337280 r8:80278fec r7:e0179e60 r6:85337300 r5:85313000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea4e9fb0 to 0xea4e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85334400 INFO: task kworker/1:62:4596 is blocked on a mutex likely owned by task kworker/1:55:4553. task:kworker/1:55 state:R running task stack:0 pid:4553 tgid:4553 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6441c>] (__schedule) from [<81a657e4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:83b41800 r8:80200c04 r7:e01b9d54 r6:ffffffff r5:83b41800 r4:00000000 [<81a657a4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xe01b9d20 to 0xe01b9d68) 9d20: 9dcc2000 eaf4b000 00000001 80239bf8 7f011000 00000001 82acb1c4 82aca5a0 9d40: 7f011000 eaf4b000 8280c9b4 e01b9d9c e01b9da0 e01b9d70 80230af0 80239c10 9d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea140>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9ebc>] (__purge_vmap_area_lazy) from [<804ea4f8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e01b9dc0 r5:e01b9e08 r4:e01b9dc0 [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853344c0 r4:00000000 [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:83b41800 r7:00000000 r6:83018600 r5:00001000 r4:7f033000 [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:e01e7000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84f7cb8c r4:85331f00 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84f7cb8c r4:85331f00 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:83b41800 r8:85331f2c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85331f00 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85331f00 r8:80278fec r7:df959e60 r6:85331f80 r5:83b41800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe01b9fb0 to 0xe01b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:84e0e300 INFO: task kworker/1:63:4603 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:63 state:D stack:0 pid:4603 tgid:4603 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6441c>] (__schedule) from [<81a653b0>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a6441c>] (__schedule) from [<81a653b0>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:e42bdd84 r9:00000002 r8:60000013 r7:829171a0 r6:e42bdd8c r5:851d0c00 r4:851d0c00 [<81a65384>] (schedule) from [<81a65798>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:851d0c00 r4:8291719c [<81a65780>] (schedule_preempt_disabled) from [<81a68348>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65780>] (schedule_preempt_disabled) from [<81a68348>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67ff8>] (__mutex_lock.constprop.0) from [<81a68af0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e42bde08 r4:00000000 [<81a68adc>] (__mutex_lock_slowpath) from [<81a68b30>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68af4>] (mutex_lock) from [<804ea37c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85334f40 r4:00000000 [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:851d0c00 r7:00000000 r6:83018600 r5:00001000 r4:7f031000 [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:e0015000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85295b8c r4:85337500 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:85295b8c r4:85337500 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:851d0c00 r8:8533752c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85337500 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85337500 r8:80278fec r7:ea4e9e60 r6:85337580 r5:851d0c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe42bdfb0 to 0xe42bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85334fc0 INFO: task kworker/1:63:4603 is blocked on a mutex likely owned by task kworker/1:55:4553. task:kworker/1:55 state:R running task stack:0 pid:4553 tgid:4553 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6441c>] (__schedule) from [<81a657e4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:83b41800 r8:80200c04 r7:e01b9d54 r6:ffffffff r5:83b41800 r4:00000000 [<81a657a4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xe01b9d20 to 0xe01b9d68) 9d20: 9dcc2000 eaf4b000 00000001 80239bf8 7f011000 00000001 82acb1c4 82aca5a0 9d40: 7f011000 eaf4b000 8280c9b4 e01b9d9c e01b9da0 e01b9d70 80230af0 80239c10 9d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea140>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9ebc>] (__purge_vmap_area_lazy) from [<804ea4f8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e01b9dc0 r5:e01b9e08 r4:e01b9dc0 [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853344c0 r4:00000000 [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:83b41800 r7:00000000 r6:83018600 r5:00001000 r4:7f033000 [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:e01e7000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84f7cb8c r4:85331f00 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84f7cb8c r4:85331f00 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:83b41800 r8:85331f2c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85331f00 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85331f00 r8:80278fec r7:df959e60 r6:85331f80 r5:83b41800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe01b9fb0 to 0xe01b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:84e0e300 INFO: task kworker/1:64:4604 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:64 state:D stack:0 pid:4604 tgid:4604 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6441c>] (__schedule) from [<81a653b0>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a6441c>] (__schedule) from [<81a653b0>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:e42cdd84 r9:00000002 r8:60000113 r7:829171a0 r6:e42cdd8c r5:851d0000 r4:851d0000 [<81a65384>] (schedule) from [<81a65798>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:851d0000 r4:8291719c [<81a65780>] (schedule_preempt_disabled) from [<81a68348>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65780>] (schedule_preempt_disabled) from [<81a68348>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67ff8>] (__mutex_lock.constprop.0) from [<81a68af0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e42cde08 r4:00000000 [<81a68adc>] (__mutex_lock_slowpath) from [<81a68b30>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68af4>] (mutex_lock) from [<804ea37c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84905900 r4:00000000 [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:851d0000 r7:00000000 r6:83018600 r5:00001000 r4:7f029000 [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:df93b000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84d8238c r4:85337480 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84d8238c r4:85337480 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:851d0000 r8:853374ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85337480 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85337480 r8:80278fec r7:ea4e9e60 r6:85337680 r5:851d0000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe42cdfb0 to 0xe42cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:84ec7840 INFO: task kworker/1:64:4604 is blocked on a mutex likely owned by task kworker/1:55:4553. task:kworker/1:55 state:R running task stack:0 pid:4553 tgid:4553 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6441c>] (__schedule) from [<81a657e4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:83b41800 r8:80200c04 r7:e01b9d54 r6:ffffffff r5:83b41800 r4:00000000 [<81a657a4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xe01b9d20 to 0xe01b9d68) 9d20: 9dcc2000 eaf4b000 00000001 80239bf8 7f011000 00000001 82acb1c4 82aca5a0 9d40: 7f011000 eaf4b000 8280c9b4 e01b9d9c e01b9da0 e01b9d70 80230af0 80239c10 9d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea140>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9ebc>] (__purge_vmap_area_lazy) from [<804ea4f8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e01b9dc0 r5:e01b9e08 r4:e01b9dc0 [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853344c0 r4:00000000 [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:83b41800 r7:00000000 r6:83018600 r5:00001000 r4:7f033000 [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:e01e7000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84f7cb8c r4:85331f00 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84f7cb8c r4:85331f00 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:83b41800 r8:85331f2c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85331f00 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85331f00 r8:80278fec r7:df959e60 r6:85331f80 r5:83b41800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe01b9fb0 to 0xe01b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:84e0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:65:4607 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:65 state:D stack:0 pid:4607 tgid:4607 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6441c>] (__schedule) from [<81a653b0>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a6441c>] (__schedule) from [<81a653b0>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:e01a1d84 r9:00000002 r8:60000113 r7:829171a0 r6:e01a1d8c r5:851d2400 r4:851d2400 [<81a65384>] (schedule) from [<81a65798>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:851d2400 r4:8291719c [<81a65780>] (schedule_preempt_disabled) from [<81a68348>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65780>] (schedule_preempt_disabled) from [<81a68348>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67ff8>] (__mutex_lock.constprop.0) from [<81a68af0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e01a1e08 r4:00000000 [<81a68adc>] (__mutex_lock_slowpath) from [<81a68b30>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68af4>] (mutex_lock) from [<804ea37c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a2bb40 r4:00000000 [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:851d2400 r7:00000000 r6:83018600 r5:00001000 r4:7f02b000 [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfa87000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85297b8c r4:85337880 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:85297b8c r4:85337880 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:851d2400 r8:853378ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85337880 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85337880 r8:80278fec r7:ea4e9e60 r6:85337900 r5:851d2400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe01a1fb0 to 0xe01a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:852f4300 INFO: task kworker/1:65:4607 is blocked on a mutex likely owned by task kworker/1:55:4553. task:kworker/1:55 state:R running task stack:0 pid:4553 tgid:4553 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6441c>] (__schedule) from [<81a657e4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:83b41800 r8:80200c04 r7:e01b9d54 r6:ffffffff r5:83b41800 r4:00000000 [<81a657a4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xe01b9d20 to 0xe01b9d68) 9d20: 9dcc2000 eaf4b000 00000001 80239bf8 7f011000 00000001 82acb1c4 82aca5a0 9d40: 7f011000 eaf4b000 8280c9b4 e01b9d9c e01b9da0 e01b9d70 80230af0 80239c10 9d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea140>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9ebc>] (__purge_vmap_area_lazy) from [<804ea4f8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e01b9dc0 r5:e01b9e08 r4:e01b9dc0 [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853344c0 r4:00000000 [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:83b41800 r7:00000000 r6:83018600 r5:00001000 r4:7f033000 [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:e01e7000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84f7cb8c r4:85331f00 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84f7cb8c r4:85331f00 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:83b41800 r8:85331f2c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85331f00 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85331f00 r8:80278fec r7:df959e60 r6:85331f80 r5:83b41800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe01b9fb0 to 0xe01b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:84e0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:66:4609 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:66 state:D stack:0 pid:4609 tgid:4609 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6441c>] (__schedule) from [<81a653b0>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a6441c>] (__schedule) from [<81a653b0>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:e0231d84 r9:00000002 r8:60000113 r7:829171a0 r6:e0231d8c r5:851d3000 r4:851d3000 [<81a65384>] (schedule) from [<81a65798>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:851d3000 r4:8291719c [<81a65780>] (schedule_preempt_disabled) from [<81a68348>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65780>] (schedule_preempt_disabled) from [<81a68348>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67ff8>] (__mutex_lock.constprop.0) from [<81a68af0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0231e08 r4:00000000 [<81a68adc>] (__mutex_lock_slowpath) from [<81a68b30>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68af4>] (mutex_lock) from [<804ea37c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85334fc0 r4:00000000 [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:851d3000 r7:00000000 r6:83018600 r5:00001000 r4:7f02d000 [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:e00c5000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:852caf8c r4:85337a00 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:852caf8c r4:85337a00 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:851d3000 r8:85337a2c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85337a00 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85337a00 r8:80278fec r7:e01a1e60 r6:85337a80 r5:851d3000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0231fb0 to 0xe0231ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:850c7c00 INFO: task kworker/1:66:4609 is blocked on a mutex likely owned by task kworker/1:55:4553. task:kworker/1:55 state:R running task stack:0 pid:4553 tgid:4553 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6441c>] (__schedule) from [<81a657e4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:83b41800 r8:80200c04 r7:e01b9d54 r6:ffffffff r5:83b41800 r4:00000000 [<81a657a4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xe01b9d20 to 0xe01b9d68) 9d20: 9dcc2000 eaf4b000 00000001 80239bf8 7f011000 00000001 82acb1c4 82aca5a0 9d40: 7f011000 eaf4b000 8280c9b4 e01b9d9c e01b9da0 e01b9d70 80230af0 80239c10 9d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea140>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9ebc>] (__purge_vmap_area_lazy) from [<804ea4f8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e01b9dc0 r5:e01b9e08 r4:e01b9dc0 [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853344c0 r4:00000000 [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:83b41800 r7:00000000 r6:83018600 r5:00001000 r4:7f033000 [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:e01e7000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84f7cb8c r4:85331f00 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84f7cb8c r4:85331f00 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:83b41800 r8:85331f2c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85331f00 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85331f00 r8:80278fec r7:df959e60 r6:85331f80 r5:83b41800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe01b9fb0 to 0xe01b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:84e0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:68:4614 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:68 state:D stack:0 pid:4614 tgid:4614 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6441c>] (__schedule) from [<81a653b0>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a6441c>] (__schedule) from [<81a653b0>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:e42edd84 r9:00000002 r8:60000013 r7:829171a0 r6:e42edd8c r5:851d6000 r4:851d6000 [<81a65384>] (schedule) from [<81a65798>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:851d6000 r4:8291719c [<81a65780>] (schedule_preempt_disabled) from [<81a68348>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65780>] (schedule_preempt_disabled) from [<81a68348>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67ff8>] (__mutex_lock.constprop.0) from [<81a68af0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e42ede08 r4:00000000 [<81a68adc>] (__mutex_lock_slowpath) from [<81a68b30>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68af4>] (mutex_lock) from [<804ea37c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8533d2c0 r4:00000000 [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:851d6000 r7:00000000 r6:83018600 r5:00001000 r4:7f00f000 [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfb69000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:852a978c r4:85337e00 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:852a978c r4:85337e00 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:851d6000 r8:85337e2c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85337e00 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85337e00 r8:80278fec r7:ea4e9e60 r6:85337e80 r5:851d6000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe42edfb0 to 0xe42edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:8533d180 INFO: task kworker/1:68:4614 is blocked on a mutex likely owned by task kworker/1:55:4553. task:kworker/1:55 state:R running task stack:0 pid:4553 tgid:4553 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6441c>] (__schedule) from [<81a657e4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:83b41800 r8:80200c04 r7:e01b9d54 r6:ffffffff r5:83b41800 r4:00000000 [<81a657a4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xe01b9d20 to 0xe01b9d68) 9d20: 9dcc2000 eaf4b000 00000001 80239bf8 7f011000 00000001 82acb1c4 82aca5a0 9d40: 7f011000 eaf4b000 8280c9b4 e01b9d9c e01b9da0 e01b9d70 80230af0 80239c10 9d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea140>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9ebc>] (__purge_vmap_area_lazy) from [<804ea4f8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e01b9dc0 r5:e01b9e08 r4:e01b9dc0 [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853344c0 r4:00000000 [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:83b41800 r7:00000000 r6:83018600 r5:00001000 r4:7f033000 [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:e01e7000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84f7cb8c r4:85331f00 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84f7cb8c r4:85331f00 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:83b41800 r8:85331f2c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85331f00 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85331f00 r8:80278fec r7:df959e60 r6:85331f80 r5:83b41800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe01b9fb0 to 0xe01b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:84e0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:69:4619 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:69 state:D stack:0 pid:4619 tgid:4619 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6441c>] (__schedule) from [<81a653b0>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a6441c>] (__schedule) from [<81a653b0>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:e42d1d84 r9:00000002 r8:60000013 r7:829171a0 r6:e42d1d8c r5:851d4800 r4:851d4800 [<81a65384>] (schedule) from [<81a65798>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:851d4800 r4:8291719c [<81a65780>] (schedule_preempt_disabled) from [<81a68348>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65780>] (schedule_preempt_disabled) from [<81a68348>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67ff8>] (__mutex_lock.constprop.0) from [<81a68af0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e42d1e08 r4:00000000 [<81a68adc>] (__mutex_lock_slowpath) from [<81a68b30>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68af4>] (mutex_lock) from [<804ea37c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849604c0 r4:00000000 [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:851d4800 r7:00000000 r6:83018600 r5:00001000 r4:7f011000 [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfc4f000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:852a9b8c r4:85340080 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:852a9b8c r4:85340080 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:851d4800 r8:853400ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85340080 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85340080 r8:80278fec r7:e0255e60 r6:85340100 r5:851d4800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe42d1fb0 to 0xe42d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:8533de40 INFO: task kworker/1:69:4619 is blocked on a mutex likely owned by task kworker/1:55:4553. task:kworker/1:55 state:R running task stack:0 pid:4553 tgid:4553 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6441c>] (__schedule) from [<81a657e4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:83b41800 r8:80200c04 r7:e01b9d54 r6:ffffffff r5:83b41800 r4:00000000 [<81a657a4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xe01b9d20 to 0xe01b9d68) 9d20: 9dcc2000 eaf4b000 00000001 80239bf8 7f011000 00000001 82acb1c4 82aca5a0 9d40: 7f011000 eaf4b000 8280c9b4 e01b9d9c e01b9da0 e01b9d70 80230af0 80239c10 9d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea140>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9ebc>] (__purge_vmap_area_lazy) from [<804ea4f8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e01b9dc0 r5:e01b9e08 r4:e01b9dc0 [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853344c0 r4:00000000 [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:83b41800 r7:00000000 r6:83018600 r5:00001000 r4:7f033000 [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:e01e7000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84f7cb8c r4:85331f00 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84f7cb8c r4:85331f00 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:83b41800 r8:85331f2c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85331f00 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85331f00 r8:80278fec r7:df959e60 r6:85331f80 r5:83b41800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe01b9fb0 to 0xe01b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:84e0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:70:4622 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:70 state:D stack:0 pid:4622 tgid:4622 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6441c>] (__schedule) from [<81a653b0>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a6441c>] (__schedule) from [<81a653b0>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:e01c1d84 r9:00000002 r8:60000013 r7:829171a0 r6:e01c1d8c r5:851d6c00 r4:851d6c00 [<81a65384>] (schedule) from [<81a65798>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:851d6c00 r4:8291719c [<81a65780>] (schedule_preempt_disabled) from [<81a68348>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65780>] (schedule_preempt_disabled) from [<81a68348>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67ff8>] (__mutex_lock.constprop.0) from [<81a68af0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e01c1e08 r4:00000000 [<81a68adc>] (__mutex_lock_slowpath) from [<81a68b30>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68af4>] (mutex_lock) from [<804ea37c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8533dac0 r4:00000000 [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:851d6c00 r7:00000000 r6:83018600 r5:00001000 r4:7f02f000 [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:e0033000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:852a938c r4:85340300 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:852a938c r4:85340300 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:851d6c00 r8:8534032c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85340300 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85340300 r8:80278fec r7:e0255e60 r6:85340380 r5:851d6c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe01c1fb0 to 0xe01c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:8533d280 INFO: task kworker/1:70:4622 is blocked on a mutex likely owned by task kworker/1:55:4553. task:kworker/1:55 state:R running task stack:0 pid:4553 tgid:4553 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6441c>] (__schedule) from [<81a657e4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:83b41800 r8:80200c04 r7:e01b9d54 r6:ffffffff r5:83b41800 r4:00000000 [<81a657a4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xe01b9d20 to 0xe01b9d68) 9d20: 9dcc2000 eaf4b000 00000001 80239bf8 7f011000 00000001 82acb1c4 82aca5a0 9d40: 7f011000 eaf4b000 8280c9b4 e01b9d9c e01b9da0 e01b9d70 80230af0 80239c10 9d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea140>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9ebc>] (__purge_vmap_area_lazy) from [<804ea4f8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e01b9dc0 r5:e01b9e08 r4:e01b9dc0 [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853344c0 r4:00000000 [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:83b41800 r7:00000000 r6:83018600 r5:00001000 r4:7f033000 [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:e01e7000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84f7cb8c r4:85331f00 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84f7cb8c r4:85331f00 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:83b41800 r8:85331f2c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85331f00 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85331f00 r8:80278fec r7:df959e60 r6:85331f80 r5:83b41800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe01b9fb0 to 0xe01b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:84e0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:72:4628 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:72 state:D stack:0 pid:4628 tgid:4628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6441c>] (__schedule) from [<81a653b0>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a6441c>] (__schedule) from [<81a653b0>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:e8315d84 r9:00000002 r8:60000013 r7:829171a0 r6:e8315d8c r5:83884800 r4:83884800 [<81a65384>] (schedule) from [<81a65798>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:83884800 r4:8291719c [<81a65780>] (schedule_preempt_disabled) from [<81a68348>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65780>] (schedule_preempt_disabled) from [<81a68348>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67ff8>] (__mutex_lock.constprop.0) from [<81a68af0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8315e08 r4:00000000 [<81a68adc>] (__mutex_lock_slowpath) from [<81a68b30>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68af4>] (mutex_lock) from [<804ea37c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85341980 r4:00000000 [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:83884800 r7:00000000 r6:83018600 r5:00001000 r4:7f02b000 [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfa9b000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:852ab78c r4:85340600 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:852ab78c r4:85340600 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:83884800 r8:8534062c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85340600 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85340600 r8:80278fec r7:e0255e60 r6:85340680 r5:83884800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8315fb0 to 0xe8315ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85341580 INFO: task kworker/1:72:4628 is blocked on a mutex likely owned by task kworker/1:55:4553. task:kworker/1:55 state:R running task stack:0 pid:4553 tgid:4553 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a6441c>] (__schedule) from [<81a657e4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:83b41800 r8:80200c04 r7:e01b9d54 r6:ffffffff r5:83b41800 r4:00000000 [<81a657a4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xe01b9d20 to 0xe01b9d68) 9d20: 9dcc2000 eaf4b000 00000001 80239bf8 7f011000 00000001 82acb1c4 82aca5a0 9d40: 7f011000 eaf4b000 8280c9b4 e01b9d9c e01b9da0 e01b9d70 80230af0 80239c10 9d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea140>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9ebc>] (__purge_vmap_area_lazy) from [<804ea4f8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e01b9dc0 r5:e01b9e08 r4:e01b9dc0 [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853344c0 r4:00000000 [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:83b41800 r7:00000000 r6:83018600 r5:00001000 r4:7f033000 [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:e01e7000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84f7cb8c r4:85331f00 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84f7cb8c r4:85331f00 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:83b41800 r8:85331f2c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85331f00 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85331f00 r8:80278fec r7:df959e60 r6:85331f80 r5:83b41800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe01b9fb0 to 0xe01b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:84e0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 30 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT Hardware name: ARM-Versatile Express Call trace: [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c arch/arm/kernel/traps.c:257) r7:00000000 r6:000d0113 r5:600d0193 r4:8225274c [<80201b08>] (show_stack) from [<8021f8f8>] (__dump_stack lib/dump_stack.c:94 [inline]) [<80201b08>] (show_stack) from [<8021f8f8>] (dump_stack_lvl+0x70/0x7c lib/dump_stack.c:120) [<8021f888>] (dump_stack_lvl) from [<8021f91c>] (dump_stack+0x18/0x1c lib/dump_stack.c:129) r5:00000000 r4:00000001 [<8021f904>] (dump_stack) from [<81a4e034>] (nmi_cpu_backtrace+0x160/0x17c lib/nmi_backtrace.c:113) [<81a4ded4>] (nmi_cpu_backtrace) from [<81a4e180>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8 lib/nmi_backtrace.c:62) r7:00000000 r6:8280c690 r5:8281ae34 r4:ffffffff [<81a4e050>] (nmi_trigger_cpumask_backtrace) from [<802304fc>] (arch_trigger_cpumask_backtrace+0x18/0x1c arch/arm/kernel/smp.c:852) r9:8281ba28 r8:8280c810 r7:0000b4f2 r6:00007cb1 r5:82abf7d4 r4:85a83c0c [<802304e4>] (arch_trigger_cpumask_backtrace) from [<8037faf8>] (trigger_all_cpu_backtrace include/linux/nmi.h:160 [inline]) [<802304e4>] (arch_trigger_cpumask_backtrace) from [<8037faf8>] (check_hung_uninterruptible_tasks kernel/hung_task.c:332 [inline]) [<802304e4>] (arch_trigger_cpumask_backtrace) from [<8037faf8>] (watchdog+0x5d0/0x850 kernel/hung_task.c:495) [<8037f528>] (watchdog) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:00000000 r8:8037f528 r7:83329100 r6:83329100 r5:8321e000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf8d9fb0 to 0xdf8d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:832c0ac0 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 2824 Comm: pr/ttyAMA-1 Not tainted syzkaller #0 PREEMPT Hardware name: ARM-Versatile Express PC is at __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:152 [inline] PC is at _raw_spin_unlock_irqrestore+0x28/0x54 kernel/locking/spinlock.c:194 LR is at spin_unlock_irqrestore include/linux/spinlock.h:406 [inline] LR is at __uart_port_unlock_irqrestore include/linux/serial_core.h:616 [inline] LR is at pl011_console_device_unlock+0x20/0x24 drivers/tty/serial/amba-pl011.c:2603 pc : [<81a6e284>] lr : [<80a8f5a8>] psr: 60000113 sp : eb0a5eb0 ip : eb0a5ec0 fp : eb0a5ebc r10: 82959594 r9 : 00000001 r8 : 00000000 r7 : 00000117 r6 : 829594f8 r5 : 00000000 r4 : 00000001 r3 : 000007dd r2 : 00000000 r1 : 60000113 r0 : 83f9e840 Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none Control: 30c5387d Table: 848c9a00 DAC: 00000000 Call trace: [<81a6e25c>] (_raw_spin_unlock_irqrestore) from [<80a8f5a8>] (spin_unlock_irqrestore include/linux/spinlock.h:406 [inline]) [<81a6e25c>] (_raw_spin_unlock_irqrestore) from [<80a8f5a8>] (__uart_port_unlock_irqrestore include/linux/serial_core.h:616 [inline]) [<81a6e25c>] (_raw_spin_unlock_irqrestore) from [<80a8f5a8>] (pl011_console_device_unlock+0x20/0x24 drivers/tty/serial/amba-pl011.c:2603) [<80a8f588>] (pl011_console_device_unlock) from [<802e3750>] (nbcon_emit_one+0x88/0x100 kernel/printk/nbcon.c:1142) [<802e36c8>] (nbcon_emit_one) from [<802e3970>] (nbcon_kthread_func+0x1a8/0x2a4 kernel/printk/nbcon.c:1229) r6:8280c690 r5:83bcb000 r4:829594f8 [<802e37c8>] (nbcon_kthread_func) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:829594f8 r8:802e37c8 r7:84a47c80 r6:84a47c80 r5:83bcb000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0a5fb0 to 0xeb0a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:84a2b780