INFO: task kworker/1:17:5230 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:17 state:D stack:0 pid:5230 tgid:5230 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81b1869c>] (__schedule) from [<81b19b2c>] (__schedule_loop kernel/sched/core.c:7268 [inline]) [<81b1869c>] (__schedule) from [<81b19b2c>] (schedule+0x2c/0x134 kernel/sched/core.c:7283) r10:dfaf1da4 r9:dfaf1dac r8:00000002 r7:60000113 r6:82cd0b8c r5:8402ee40 r4:8402ee40 [<81b19b00>] (schedule) from [<81b19cb8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7340) r5:8402ee40 r4:82cd0b88 [<81b19ca0>] (schedule_preempt_disabled) from [<81b1cd98>] (__mutex_lock_common kernel/locking/mutex.c:726 [inline]) [<81b19ca0>] (schedule_preempt_disabled) from [<81b1cd98>] (__mutex_lock.constprop.0+0x530/0xa88 kernel/locking/mutex.c:820) [<81b1c868>] (__mutex_lock.constprop.0) from [<81b1d3c4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1114) r10:82a0b82c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaf1e28 r4:00000000 [<81b1d3b0>] (__mutex_lock_slowpath) from [<81b1d404>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:319) [<81b1d3c8>] (mutex_lock) from [<8050c1f0>] (_vm_unmap_aliases+0x5c/0x238 mm/vmalloc.c:2951) [<8050c194>] (_vm_unmap_aliases) from [<8050ffe4>] (vm_reset_perms mm/vmalloc.c:3382 [inline]) [<8050c194>] (_vm_unmap_aliases) from [<8050ffe4>] (vfree+0x168/0x1d8 mm/vmalloc.c:3461) r10:8302ae05 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:860cbdc0 r4:00000000 [<8050fe7c>] (vfree) from [<8057f888>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:8402ee40 r8:01800000 r7:00000000 r6:8302ae00 r5:00001000 r4:7f053000 [<8057f858>] (execmem_free) from [<803d577c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1070) r5:00001000 r4:dfe43000 [<803d576c>] (bpf_jit_free_exec) from [<803d5b5c>] (bpf_jit_binary_free kernel/bpf/core.c:1116 [inline]) [<803d576c>] (bpf_jit_free_exec) from [<803d5b5c>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1239) [<803d5af8>] (bpf_jit_free) from [<803d6c04>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:3029) r5:86640f8c r4:86640f8c [<803d6abc>] (bpf_prog_free_deferred) from [<802764e8>] (process_one_work+0x1c8/0x5a0 kernel/workqueue.c:3302) r7:ddde4e00 r6:8302ae00 r5:86640f8c r4:860b9e80 [<80276320>] (process_one_work) from [<802772ac>] (process_scheduled_works kernel/workqueue.c:3385 [inline]) [<80276320>] (process_one_work) from [<802772ac>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3466) r10:ddde4e00 r9:860b9eb0 r8:8402ee40 r7:82a03d80 r6:ddde4e20 r5:ddde4e00 r4:860b9e80 [<80277140>] (worker_thread) from [<80281418>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:dfa61e88 r8:860b9e00 r7:860b9e80 r6:80277140 r5:8402ee40 r4:852c70c0 [<802812fc>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaf1fb0 to 0xdfaf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802812fc r4:852c70c0 INFO: task kworker/1:17:5230 is blocked on a mutex likely owned by task kworker/0:76:5696. task:kworker/0:76 state:R running task stack:0 pid:5696 tgid:5696 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81b1869c>] (__schedule) from [<81b19f64>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7513) r10:82a0b880 r9:83986e40 r8:80200c04 r7:e023dd7c r6:ffffffff r5:83986e40 r4:00000000 [<81b19f24>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xe023dd48 to 0xe023dd90) dd40: dac5d000 ed715000 00000000 80238790 82ccff20 82cd0b64 dd60: 7f09b000 ed715000 00000000 00000001 82a0b880 e023ddbc ed715000 e023dd98 dd80: 8022f6e0 802387a8 80000013 ffffffff r5:80000013 r4:802387a8 [<8022f680>] (flush_tlb_kernel_range) from [<8050bfa4>] (__purge_vmap_area_lazy+0x294/0x484 mm/vmalloc.c:2376) [<8050bd10>] (__purge_vmap_area_lazy) from [<8050c37c>] (_vm_unmap_aliases+0x1e8/0x238 mm/vmalloc.c:2990) r10:00000000 r9:e023dde0 r8:00000000 r7:ffffffff r6:00000008 r5:e023de28 r4:e023dde0 [<8050c194>] (_vm_unmap_aliases) from [<8050ffe4>] (vm_reset_perms mm/vmalloc.c:3382 [inline]) [<8050c194>] (_vm_unmap_aliases) from [<8050ffe4>] (vfree+0x168/0x1d8 mm/vmalloc.c:3461) r10:8302b005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:865975c0 r4:00000000 [<8050fe7c>] (vfree) from [<8057f888>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83986e40 r8:00800000 r7:00000000 r6:8302b000 r5:00001000 r4:7f0bd000 [<8057f858>] (execmem_free) from [<803d577c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1070) r5:00001000 r4:ecec9000 [<803d576c>] (bpf_jit_free_exec) from [<803d5b5c>] (bpf_jit_binary_free kernel/bpf/core.c:1116 [inline]) [<803d576c>] (bpf_jit_free_exec) from [<803d5b5c>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1239) [<803d5af8>] (bpf_jit_free) from [<803d6c04>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:3029) r5:872ac38c r4:872ac38c [<803d6abc>] (bpf_prog_free_deferred) from [<802764e8>] (process_one_work+0x1c8/0x5a0 kernel/workqueue.c:3302) r7:dddd0e00 r6:8302b000 r5:872ac38c r4:864b3d00 [<80276320>] (process_one_work) from [<802772ac>] (process_scheduled_works kernel/workqueue.c:3385 [inline]) [<80276320>] (process_one_work) from [<802772ac>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3466) r10:dddd0e00 r9:864b3d30 r8:83986e40 r7:82a03d80 r6:dddd0e20 r5:dddd0e00 r4:864b3d00 [<80277140>] (worker_thread) from [<80281418>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:e02c9e88 r8:864b3480 r7:864b3d00 r6:80277140 r5:83986e40 r4:864b1580 [<802812fc>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe023dfb0 to 0xe023dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802812fc r4:864b1580 INFO: task kworker/0:40:5450 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:40 state:D stack:0 pid:5450 tgid:5450 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81b1869c>] (__schedule) from [<81b19b2c>] (__schedule_loop kernel/sched/core.c:7268 [inline]) [<81b1869c>] (__schedule) from [<81b19b2c>] (schedule+0x2c/0x134 kernel/sched/core.c:7283) r10:dfdd1da4 r9:dfdd1dac r8:00000002 r7:60000113 r6:82cd0b8c r5:83393100 r4:83393100 [<81b19b00>] (schedule) from [<81b19cb8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7340) r5:83393100 r4:82cd0b88 [<81b19ca0>] (schedule_preempt_disabled) from [<81b1cd98>] (__mutex_lock_common kernel/locking/mutex.c:726 [inline]) [<81b19ca0>] (schedule_preempt_disabled) from [<81b1cd98>] (__mutex_lock.constprop.0+0x530/0xa88 kernel/locking/mutex.c:820) [<81b1c868>] (__mutex_lock.constprop.0) from [<81b1d3c4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1114) r10:82a0b82c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfdd1e28 r4:00000000 [<81b1d3b0>] (__mutex_lock_slowpath) from [<81b1d404>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:319) [<81b1d3c8>] (mutex_lock) from [<8050c1f0>] (_vm_unmap_aliases+0x5c/0x238 mm/vmalloc.c:2951) [<8050c194>] (_vm_unmap_aliases) from [<8050ffe4>] (vm_reset_perms mm/vmalloc.c:3382 [inline]) [<8050c194>] (_vm_unmap_aliases) from [<8050ffe4>] (vfree+0x168/0x1d8 mm/vmalloc.c:3461) r10:8302b005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8612c040 r4:00000000 [<8050fe7c>] (vfree) from [<8057f888>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83393100 r8:00800000 r7:00000000 r6:8302b000 r5:00001000 r4:7f047000 [<8057f858>] (execmem_free) from [<803d577c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1070) r5:00001000 r4:dfb1d000 [<803d576c>] (bpf_jit_free_exec) from [<803d5b5c>] (bpf_jit_binary_free kernel/bpf/core.c:1116 [inline]) [<803d576c>] (bpf_jit_free_exec) from [<803d5b5c>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1239) [<803d5af8>] (bpf_jit_free) from [<803d6c04>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:3029) r5:8624578c r4:8624578c [<803d6abc>] (bpf_prog_free_deferred) from [<802764e8>] (process_one_work+0x1c8/0x5a0 kernel/workqueue.c:3302) r7:dddd0e00 r6:8302b000 r5:8624578c r4:864ac100 [<80276320>] (process_one_work) from [<802772ac>] (process_scheduled_works kernel/workqueue.c:3385 [inline]) [<80276320>] (process_one_work) from [<802772ac>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3466) r10:00000000 r9:864ac130 r8:83393100 r7:82a03d80 r6:dddd0e20 r5:dddd0e00 r4:864ac100 [<80277140>] (worker_thread) from [<80281418>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:dfe75e88 r8:864ac300 r7:864ac100 r6:80277140 r5:83393100 r4:86366cc0 [<802812fc>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfdd1fb0 to 0xdfdd1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802812fc r4:86366cc0 INFO: task kworker/0:40:5450 is blocked on a mutex likely owned by task kworker/0:76:5696. task:kworker/0:76 state:R running task stack:0 pid:5696 tgid:5696 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81b1869c>] (__schedule) from [<81b19f64>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7513) r10:82a0b880 r9:83986e40 r8:80200c04 r7:e023dd7c r6:ffffffff r5:83986e40 r4:00000000 [<81b19f24>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xe023dd48 to 0xe023dd90) dd40: dac5d000 ed715000 00000000 80238790 82ccff20 82cd0b64 dd60: 7f09b000 ed715000 00000000 00000001 82a0b880 e023ddbc ed715000 e023dd98 dd80: 8022f6e0 802387a8 80000013 ffffffff r5:80000013 r4:802387a8 [<8022f680>] (flush_tlb_kernel_range) from [<8050bfa4>] (__purge_vmap_area_lazy+0x294/0x484 mm/vmalloc.c:2376) [<8050bd10>] (__purge_vmap_area_lazy) from [<8050c37c>] (_vm_unmap_aliases+0x1e8/0x238 mm/vmalloc.c:2990) r10:00000000 r9:e023dde0 r8:00000000 r7:ffffffff r6:00000008 r5:e023de28 r4:e023dde0 [<8050c194>] (_vm_unmap_aliases) from [<8050ffe4>] (vm_reset_perms mm/vmalloc.c:3382 [inline]) [<8050c194>] (_vm_unmap_aliases) from [<8050ffe4>] (vfree+0x168/0x1d8 mm/vmalloc.c:3461) r10:8302b005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:865975c0 r4:00000000 [<8050fe7c>] (vfree) from [<8057f888>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83986e40 r8:00800000 r7:00000000 r6:8302b000 r5:00001000 r4:7f0bd000 [<8057f858>] (execmem_free) from [<803d577c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1070) r5:00001000 r4:ecec9000 [<803d576c>] (bpf_jit_free_exec) from [<803d5b5c>] (bpf_jit_binary_free kernel/bpf/core.c:1116 [inline]) [<803d576c>] (bpf_jit_free_exec) from [<803d5b5c>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1239) [<803d5af8>] (bpf_jit_free) from [<803d6c04>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:3029) r5:872ac38c r4:872ac38c [<803d6abc>] (bpf_prog_free_deferred) from [<802764e8>] (process_one_work+0x1c8/0x5a0 kernel/workqueue.c:3302) r7:dddd0e00 r6:8302b000 r5:872ac38c r4:864b3d00 [<80276320>] (process_one_work) from [<802772ac>] (process_scheduled_works kernel/workqueue.c:3385 [inline]) [<80276320>] (process_one_work) from [<802772ac>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3466) r10:dddd0e00 r9:864b3d30 r8:83986e40 r7:82a03d80 r6:dddd0e20 r5:dddd0e00 r4:864b3d00 [<80277140>] (worker_thread) from [<80281418>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:e02c9e88 r8:864b3480 r7:864b3d00 r6:80277140 r5:83986e40 r4:864b1580 [<802812fc>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe023dfb0 to 0xe023dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802812fc r4:864b1580 INFO: task kworker/0:79:5704 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:79 state:D stack:0 pid:5704 tgid:5704 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81b1869c>] (__schedule) from [<81b19b2c>] (__schedule_loop kernel/sched/core.c:7268 [inline]) [<81b1869c>] (__schedule) from [<81b19b2c>] (schedule+0x2c/0x134 kernel/sched/core.c:7283) r10:e02cdda4 r9:e02cddac r8:00000002 r7:60000113 r6:82cd0b8c r5:83ffb100 r4:83ffb100 [<81b19b00>] (schedule) from [<81b19cb8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7340) r5:83ffb100 r4:82cd0b88 [<81b19ca0>] (schedule_preempt_disabled) from [<81b1cd98>] (__mutex_lock_common kernel/locking/mutex.c:726 [inline]) [<81b19ca0>] (schedule_preempt_disabled) from [<81b1cd98>] (__mutex_lock.constprop.0+0x530/0xa88 kernel/locking/mutex.c:820) [<81b1c868>] (__mutex_lock.constprop.0) from [<81b1d3c4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1114) r10:82a0b82c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e02cde28 r4:00000000 [<81b1d3b0>] (__mutex_lock_slowpath) from [<81b1d404>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:319) [<81b1d3c8>] (mutex_lock) from [<8050c1f0>] (_vm_unmap_aliases+0x5c/0x238 mm/vmalloc.c:2951) [<8050c194>] (_vm_unmap_aliases) from [<8050ffe4>] (vm_reset_perms mm/vmalloc.c:3382 [inline]) [<8050c194>] (_vm_unmap_aliases) from [<8050ffe4>] (vfree+0x168/0x1d8 mm/vmalloc.c:3461) r10:8302b005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8632e400 r4:00000000 [<8050fe7c>] (vfree) from [<8057f888>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83ffb100 r8:00800000 r7:00000000 r6:8302b000 r5:00001000 r4:7f049000 [<8057f858>] (execmem_free) from [<803d577c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1070) r5:00001000 r4:dfbdf000 [<803d576c>] (bpf_jit_free_exec) from [<803d5b5c>] (bpf_jit_binary_free kernel/bpf/core.c:1116 [inline]) [<803d576c>] (bpf_jit_free_exec) from [<803d5b5c>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1239) [<803d5af8>] (bpf_jit_free) from [<803d6c04>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:3029) r5:86859b8c r4:86859b8c [<803d6abc>] (bpf_prog_free_deferred) from [<802764e8>] (process_one_work+0x1c8/0x5a0 kernel/workqueue.c:3302) r7:dddd0e00 r6:8302b000 r5:86859b8c r4:864b3e00 [<80276320>] (process_one_work) from [<802772ac>] (process_scheduled_works kernel/workqueue.c:3385 [inline]) [<80276320>] (process_one_work) from [<802772ac>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3466) r10:00000000 r9:864b3e30 r8:83ffb100 r7:82a03d80 r6:dddd0e20 r5:dddd0e00 r4:864b3e00 [<80277140>] (worker_thread) from [<80281418>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:e02d9e88 r8:864acc80 r7:864b3e00 r6:80277140 r5:83ffb100 r4:864a8600 [<802812fc>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe02cdfb0 to 0xe02cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802812fc r4:864a8600 INFO: task kworker/0:79:5704 is blocked on a mutex likely owned by task kworker/0:76:5696. task:kworker/0:76 state:R running task stack:0 pid:5696 tgid:5696 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81b1869c>] (__schedule) from [<81b19f64>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7513) r10:82a0b880 r9:83986e40 r8:80200c04 r7:e023dd7c r6:ffffffff r5:83986e40 r4:00000000 [<81b19f24>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xe023dd48 to 0xe023dd90) dd40: dac5d000 ed715000 00000000 80238790 82ccff20 82cd0b64 dd60: 7f09b000 ed715000 00000000 00000001 82a0b880 e023ddbc ed715000 e023dd98 dd80: 8022f6e0 802387a8 80000013 ffffffff r5:80000013 r4:802387a8 [<8022f680>] (flush_tlb_kernel_range) from [<8050bfa4>] (__purge_vmap_area_lazy+0x294/0x484 mm/vmalloc.c:2376) [<8050bd10>] (__purge_vmap_area_lazy) from [<8050c37c>] (_vm_unmap_aliases+0x1e8/0x238 mm/vmalloc.c:2990) r10:00000000 r9:e023dde0 r8:00000000 r7:ffffffff r6:00000008 r5:e023de28 r4:e023dde0 [<8050c194>] (_vm_unmap_aliases) from [<8050ffe4>] (vm_reset_perms mm/vmalloc.c:3382 [inline]) [<8050c194>] (_vm_unmap_aliases) from [<8050ffe4>] (vfree+0x168/0x1d8 mm/vmalloc.c:3461) r10:8302b005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:865975c0 r4:00000000 [<8050fe7c>] (vfree) from [<8057f888>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83986e40 r8:00800000 r7:00000000 r6:8302b000 r5:00001000 r4:7f0bd000 [<8057f858>] (execmem_free) from [<803d577c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1070) r5:00001000 r4:ecec9000 [<803d576c>] (bpf_jit_free_exec) from [<803d5b5c>] (bpf_jit_binary_free kernel/bpf/core.c:1116 [inline]) [<803d576c>] (bpf_jit_free_exec) from [<803d5b5c>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1239) [<803d5af8>] (bpf_jit_free) from [<803d6c04>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:3029) r5:872ac38c r4:872ac38c [<803d6abc>] (bpf_prog_free_deferred) from [<802764e8>] (process_one_work+0x1c8/0x5a0 kernel/workqueue.c:3302) r7:dddd0e00 r6:8302b000 r5:872ac38c r4:864b3d00 [<80276320>] (process_one_work) from [<802772ac>] (process_scheduled_works kernel/workqueue.c:3385 [inline]) [<80276320>] (process_one_work) from [<802772ac>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3466) r10:dddd0e00 r9:864b3d30 r8:83986e40 r7:82a03d80 r6:dddd0e20 r5:dddd0e00 r4:864b3d00 [<80277140>] (worker_thread) from [<80281418>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:e02c9e88 r8:864b3480 r7:864b3d00 r6:80277140 r5:83986e40 r4:864b1580 [<802812fc>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe023dfb0 to 0xe023dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802812fc r4:864b1580 INFO: task kworker/1:107:5850 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:107 state:D stack:0 pid:5850 tgid:5850 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81b1869c>] (__schedule) from [<81b19b2c>] (__schedule_loop kernel/sched/core.c:7268 [inline]) [<81b1869c>] (__schedule) from [<81b19b2c>] (schedule+0x2c/0x134 kernel/sched/core.c:7283) r10:e0451da4 r9:e0451dac r8:00000002 r7:60000013 r6:82cd0b8c r5:851e6200 r4:851e6200 [<81b19b00>] (schedule) from [<81b19cb8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7340) r5:851e6200 r4:82cd0b88 [<81b19ca0>] (schedule_preempt_disabled) from [<81b1cd98>] (__mutex_lock_common kernel/locking/mutex.c:726 [inline]) [<81b19ca0>] (schedule_preempt_disabled) from [<81b1cd98>] (__mutex_lock.constprop.0+0x530/0xa88 kernel/locking/mutex.c:820) [<81b1c868>] (__mutex_lock.constprop.0) from [<81b1d3c4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1114) r10:82a0b82c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0451e28 r4:00000000 [<81b1d3b0>] (__mutex_lock_slowpath) from [<81b1d404>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:319) [<81b1d3c8>] (mutex_lock) from [<8050c1f0>] (_vm_unmap_aliases+0x5c/0x238 mm/vmalloc.c:2951) [<8050c194>] (_vm_unmap_aliases) from [<8050ffe4>] (vm_reset_perms mm/vmalloc.c:3382 [inline]) [<8050c194>] (_vm_unmap_aliases) from [<8050ffe4>] (vfree+0x168/0x1d8 mm/vmalloc.c:3461) r10:8302ae05 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:860cbf40 r4:00000000 [<8050fe7c>] (vfree) from [<8057f888>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:851e6200 r8:01800000 r7:00000000 r6:8302ae00 r5:00001000 r4:7f04d000 [<8057f858>] (execmem_free) from [<803d577c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1070) r5:00001000 r4:dfdb9000 [<803d576c>] (bpf_jit_free_exec) from [<803d5b5c>] (bpf_jit_binary_free kernel/bpf/core.c:1116 [inline]) [<803d576c>] (bpf_jit_free_exec) from [<803d5b5c>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1239) [<803d5af8>] (bpf_jit_free) from [<803d6c04>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:3029) r5:8660978c r4:8660978c [<803d6abc>] (bpf_prog_free_deferred) from [<802764e8>] (process_one_work+0x1c8/0x5a0 kernel/workqueue.c:3302) r7:ddde4e00 r6:8302ae00 r5:8660978c r4:86469f00 [<80276320>] (process_one_work) from [<802772ac>] (process_scheduled_works kernel/workqueue.c:3385 [inline]) [<80276320>] (process_one_work) from [<802772ac>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3466) r10:00000000 r9:86469f30 r8:851e6200 r7:82a03d80 r6:ddde4e20 r5:ddde4e00 r4:86469f00 [<80277140>] (worker_thread) from [<80281418>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:e03ade88 r8:860ea800 r7:86469f00 r6:80277140 r5:851e6200 r4:8646f880 [<802812fc>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802812fc r4:8646f880 INFO: task kworker/1:107:5850 is blocked on a mutex likely owned by task kworker/0:76:5696. task:kworker/0:76 state:R running task stack:0 pid:5696 tgid:5696 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81b1869c>] (__schedule) from [<81b19f64>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7513) r10:82a0b880 r9:83986e40 r8:80200c04 r7:e023dd7c r6:ffffffff r5:83986e40 r4:00000000 [<81b19f24>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xe023dd48 to 0xe023dd90) dd40: dac5d000 ed715000 00000000 80238790 82ccff20 82cd0b64 dd60: 7f09b000 ed715000 00000000 00000001 82a0b880 e023ddbc ed715000 e023dd98 dd80: 8022f6e0 802387a8 80000013 ffffffff r5:80000013 r4:802387a8 [<8022f680>] (flush_tlb_kernel_range) from [<8050bfa4>] (__purge_vmap_area_lazy+0x294/0x484 mm/vmalloc.c:2376) [<8050bd10>] (__purge_vmap_area_lazy) from [<8050c37c>] (_vm_unmap_aliases+0x1e8/0x238 mm/vmalloc.c:2990) r10:00000000 r9:e023dde0 r8:00000000 r7:ffffffff r6:00000008 r5:e023de28 r4:e023dde0 [<8050c194>] (_vm_unmap_aliases) from [<8050ffe4>] (vm_reset_perms mm/vmalloc.c:3382 [inline]) [<8050c194>] (_vm_unmap_aliases) from [<8050ffe4>] (vfree+0x168/0x1d8 mm/vmalloc.c:3461) r10:8302b005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:865975c0 r4:00000000 [<8050fe7c>] (vfree) from [<8057f888>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83986e40 r8:00800000 r7:00000000 r6:8302b000 r5:00001000 r4:7f0bd000 [<8057f858>] (execmem_free) from [<803d577c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1070) r5:00001000 r4:ecec9000 [<803d576c>] (bpf_jit_free_exec) from [<803d5b5c>] (bpf_jit_binary_free kernel/bpf/core.c:1116 [inline]) [<803d576c>] (bpf_jit_free_exec) from [<803d5b5c>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1239) [<803d5af8>] (bpf_jit_free) from [<803d6c04>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:3029) r5:872ac38c r4:872ac38c [<803d6abc>] (bpf_prog_free_deferred) from [<802764e8>] (process_one_work+0x1c8/0x5a0 kernel/workqueue.c:3302) r7:dddd0e00 r6:8302b000 r5:872ac38c r4:864b3d00 [<80276320>] (process_one_work) from [<802772ac>] (process_scheduled_works kernel/workqueue.c:3385 [inline]) [<80276320>] (process_one_work) from [<802772ac>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3466) r10:dddd0e00 r9:864b3d30 r8:83986e40 r7:82a03d80 r6:dddd0e20 r5:dddd0e00 r4:864b3d00 [<80277140>] (worker_thread) from [<80281418>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:e02c9e88 r8:864b3480 r7:864b3d00 r6:80277140 r5:83986e40 r4:864b1580 [<802812fc>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe023dfb0 to 0xe023dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802812fc r4:864b1580 INFO: task kworker/1:111:5864 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:111 state:D stack:0 pid:5864 tgid:5864 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81b1869c>] (__schedule) from [<81b19b2c>] (__schedule_loop kernel/sched/core.c:7268 [inline]) [<81b1869c>] (__schedule) from [<81b19b2c>] (schedule+0x2c/0x134 kernel/sched/core.c:7283) r10:e0401da4 r9:e0401dac r8:00000002 r7:60000113 r6:82cd0b8c r5:86416e40 r4:86416e40 [<81b19b00>] (schedule) from [<81b19cb8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7340) r5:86416e40 r4:82cd0b88 [<81b19ca0>] (schedule_preempt_disabled) from [<81b1cd98>] (__mutex_lock_common kernel/locking/mutex.c:726 [inline]) [<81b19ca0>] (schedule_preempt_disabled) from [<81b1cd98>] (__mutex_lock.constprop.0+0x530/0xa88 kernel/locking/mutex.c:820) [<81b1c868>] (__mutex_lock.constprop.0) from [<81b1d3c4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1114) r10:82a0b82c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0401e28 r4:00000000 [<81b1d3b0>] (__mutex_lock_slowpath) from [<81b1d404>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:319) [<81b1d3c8>] (mutex_lock) from [<8050c1f0>] (_vm_unmap_aliases+0x5c/0x238 mm/vmalloc.c:2951) [<8050c194>] (_vm_unmap_aliases) from [<8050ffe4>] (vm_reset_perms mm/vmalloc.c:3382 [inline]) [<8050c194>] (_vm_unmap_aliases) from [<8050ffe4>] (vfree+0x168/0x1d8 mm/vmalloc.c:3461) r10:8302ae05 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:860cb3c0 r4:00000000 [<8050fe7c>] (vfree) from [<8057f888>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:86416e40 r8:01800000 r7:00000000 r6:8302ae00 r5:00001000 r4:7f04b000 [<8057f858>] (execmem_free) from [<803d577c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1070) r5:00001000 r4:dfccf000 [<803d576c>] (bpf_jit_free_exec) from [<803d5b5c>] (bpf_jit_binary_free kernel/bpf/core.c:1116 [inline]) [<803d576c>] (bpf_jit_free_exec) from [<803d5b5c>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1239) [<803d5af8>] (bpf_jit_free) from [<803d6c04>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:3029) r5:866d578c r4:866d578c [<803d6abc>] (bpf_prog_free_deferred) from [<802764e8>] (process_one_work+0x1c8/0x5a0 kernel/workqueue.c:3302) r7:ddde4e00 r6:8302ae00 r5:866d578c r4:860eab00 [<80276320>] (process_one_work) from [<802772ac>] (process_scheduled_works kernel/workqueue.c:3385 [inline]) [<80276320>] (process_one_work) from [<802772ac>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3466) r10:ddde4e00 r9:860eab30 r8:86416e40 r7:82a03d80 r6:ddde4e20 r5:ddde4e00 r4:860eab00 [<80277140>] (worker_thread) from [<80281418>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:e0465e88 r8:86463180 r7:860eab00 r6:80277140 r5:86416e40 r4:8646f2c0 [<802812fc>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0401fb0 to 0xe0401ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802812fc r4:8646f2c0 INFO: task kworker/1:111:5864 is blocked on a mutex likely owned by task kworker/0:76:5696. task:kworker/0:76 state:R running task stack:0 pid:5696 tgid:5696 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81b1869c>] (__schedule) from [<81b19f64>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7513) r10:82a0b880 r9:83986e40 r8:80200c04 r7:e023dd7c r6:ffffffff r5:83986e40 r4:00000000 [<81b19f24>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xe023dd48 to 0xe023dd90) dd40: dac5d000 ed715000 00000000 80238790 82ccff20 82cd0b64 dd60: 7f09b000 ed715000 00000000 00000001 82a0b880 e023ddbc ed715000 e023dd98 dd80: 8022f6e0 802387a8 80000013 ffffffff r5:80000013 r4:802387a8 [<8022f680>] (flush_tlb_kernel_range) from [<8050bfa4>] (__purge_vmap_area_lazy+0x294/0x484 mm/vmalloc.c:2376) [<8050bd10>] (__purge_vmap_area_lazy) from [<8050c37c>] (_vm_unmap_aliases+0x1e8/0x238 mm/vmalloc.c:2990) r10:00000000 r9:e023dde0 r8:00000000 r7:ffffffff r6:00000008 r5:e023de28 r4:e023dde0 [<8050c194>] (_vm_unmap_aliases) from [<8050ffe4>] (vm_reset_perms mm/vmalloc.c:3382 [inline]) [<8050c194>] (_vm_unmap_aliases) from [<8050ffe4>] (vfree+0x168/0x1d8 mm/vmalloc.c:3461) r10:8302b005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:865975c0 r4:00000000 [<8050fe7c>] (vfree) from [<8057f888>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83986e40 r8:00800000 r7:00000000 r6:8302b000 r5:00001000 r4:7f0bd000 [<8057f858>] (execmem_free) from [<803d577c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1070) r5:00001000 r4:ecec9000 [<803d576c>] (bpf_jit_free_exec) from [<803d5b5c>] (bpf_jit_binary_free kernel/bpf/core.c:1116 [inline]) [<803d576c>] (bpf_jit_free_exec) from [<803d5b5c>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1239) [<803d5af8>] (bpf_jit_free) from [<803d6c04>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:3029) r5:872ac38c r4:872ac38c [<803d6abc>] (bpf_prog_free_deferred) from [<802764e8>] (process_one_work+0x1c8/0x5a0 kernel/workqueue.c:3302) r7:dddd0e00 r6:8302b000 r5:872ac38c r4:864b3d00 [<80276320>] (process_one_work) from [<802772ac>] (process_scheduled_works kernel/workqueue.c:3385 [inline]) [<80276320>] (process_one_work) from [<802772ac>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3466) r10:dddd0e00 r9:864b3d30 r8:83986e40 r7:82a03d80 r6:dddd0e20 r5:dddd0e00 r4:864b3d00 [<80277140>] (worker_thread) from [<80281418>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:e02c9e88 r8:864b3480 r7:864b3d00 r6:80277140 r5:83986e40 r4:864b1580 [<802812fc>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe023dfb0 to 0xe023dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802812fc r4:864b1580 INFO: task kworker/1:112:5871 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:112 state:D stack:0 pid:5871 tgid:5871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81b1869c>] (__schedule) from [<81b19b2c>] (__schedule_loop kernel/sched/core.c:7268 [inline]) [<81b1869c>] (__schedule) from [<81b19b2c>] (schedule+0x2c/0x134 kernel/sched/core.c:7283) r10:e0471da4 r9:e0471dac r8:00000002 r7:60000113 r6:82cd0b8c r5:83ffc980 r4:83ffc980 [<81b19b00>] (schedule) from [<81b19cb8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7340) r5:83ffc980 r4:82cd0b88 [<81b19ca0>] (schedule_preempt_disabled) from [<81b1cd98>] (__mutex_lock_common kernel/locking/mutex.c:726 [inline]) [<81b19ca0>] (schedule_preempt_disabled) from [<81b1cd98>] (__mutex_lock.constprop.0+0x530/0xa88 kernel/locking/mutex.c:820) [<81b1c868>] (__mutex_lock.constprop.0) from [<81b1d3c4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1114) r10:82a0b82c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0471e28 r4:00000000 [<81b1d3b0>] (__mutex_lock_slowpath) from [<81b1d404>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:319) [<81b1d3c8>] (mutex_lock) from [<8050c1f0>] (_vm_unmap_aliases+0x5c/0x238 mm/vmalloc.c:2951) [<8050c194>] (_vm_unmap_aliases) from [<8050ffe4>] (vm_reset_perms mm/vmalloc.c:3382 [inline]) [<8050c194>] (_vm_unmap_aliases) from [<8050ffe4>] (vfree+0x168/0x1d8 mm/vmalloc.c:3461) r10:8302ae05 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f67640 r4:00000000 [<8050fe7c>] (vfree) from [<8057f888>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83ffc980 r8:01800000 r7:00000000 r6:8302ae00 r5:00001000 r4:7f045000 [<8057f858>] (execmem_free) from [<803d577c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1070) r5:00001000 r4:dfa6d000 [<803d576c>] (bpf_jit_free_exec) from [<803d5b5c>] (bpf_jit_binary_free kernel/bpf/core.c:1116 [inline]) [<803d576c>] (bpf_jit_free_exec) from [<803d5b5c>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1239) [<803d5af8>] (bpf_jit_free) from [<803d6c04>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:3029) r5:86566f8c r4:86566f8c [<803d6abc>] (bpf_prog_free_deferred) from [<802764e8>] (process_one_work+0x1c8/0x5a0 kernel/workqueue.c:3302) r7:ddde4e00 r6:8302ae00 r5:86566f8c r4:86469c80 [<80276320>] (process_one_work) from [<802772ac>] (process_scheduled_works kernel/workqueue.c:3385 [inline]) [<80276320>] (process_one_work) from [<802772ac>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3466) r10:00000000 r9:86469cb0 r8:83ffc980 r7:82a03d80 r6:ddde4e20 r5:ddde4e00 r4:86469c80 [<80277140>] (worker_thread) from [<80281418>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:e0401e88 r8:8645e000 r7:86469c80 r6:80277140 r5:83ffc980 r4:8646f040 [<802812fc>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0471fb0 to 0xe0471ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802812fc r4:8646f040 INFO: task kworker/1:112:5871 is blocked on a mutex likely owned by task kworker/0:76:5696. task:kworker/0:76 state:R running task stack:0 pid:5696 tgid:5696 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81b1869c>] (__schedule) from [<81b19f64>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7513) r10:82a0b880 r9:83986e40 r8:80200c04 r7:e023dd7c r6:ffffffff r5:83986e40 r4:00000000 [<81b19f24>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xe023dd48 to 0xe023dd90) dd40: dac5d000 ed715000 00000000 80238790 82ccff20 82cd0b64 dd60: 7f09b000 ed715000 00000000 00000001 82a0b880 e023ddbc ed715000 e023dd98 dd80: 8022f6e0 802387a8 80000013 ffffffff r5:80000013 r4:802387a8 [<8022f680>] (flush_tlb_kernel_range) from [<8050bfa4>] (__purge_vmap_area_lazy+0x294/0x484 mm/vmalloc.c:2376) [<8050bd10>] (__purge_vmap_area_lazy) from [<8050c37c>] (_vm_unmap_aliases+0x1e8/0x238 mm/vmalloc.c:2990) r10:00000000 r9:e023dde0 r8:00000000 r7:ffffffff r6:00000008 r5:e023de28 r4:e023dde0 [<8050c194>] (_vm_unmap_aliases) from [<8050ffe4>] (vm_reset_perms mm/vmalloc.c:3382 [inline]) [<8050c194>] (_vm_unmap_aliases) from [<8050ffe4>] (vfree+0x168/0x1d8 mm/vmalloc.c:3461) r10:8302b005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:865975c0 r4:00000000 [<8050fe7c>] (vfree) from [<8057f888>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83986e40 r8:00800000 r7:00000000 r6:8302b000 r5:00001000 r4:7f0bd000 [<8057f858>] (execmem_free) from [<803d577c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1070) r5:00001000 r4:ecec9000 [<803d576c>] (bpf_jit_free_exec) from [<803d5b5c>] (bpf_jit_binary_free kernel/bpf/core.c:1116 [inline]) [<803d576c>] (bpf_jit_free_exec) from [<803d5b5c>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1239) [<803d5af8>] (bpf_jit_free) from [<803d6c04>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:3029) r5:872ac38c r4:872ac38c [<803d6abc>] (bpf_prog_free_deferred) from [<802764e8>] (process_one_work+0x1c8/0x5a0 kernel/workqueue.c:3302) r7:dddd0e00 r6:8302b000 r5:872ac38c r4:864b3d00 [<80276320>] (process_one_work) from [<802772ac>] (process_scheduled_works kernel/workqueue.c:3385 [inline]) [<80276320>] (process_one_work) from [<802772ac>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3466) r10:dddd0e00 r9:864b3d30 r8:83986e40 r7:82a03d80 r6:dddd0e20 r5:dddd0e00 r4:864b3d00 [<80277140>] (worker_thread) from [<80281418>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:e02c9e88 r8:864b3480 r7:864b3d00 r6:80277140 r5:83986e40 r4:864b1580 [<802812fc>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe023dfb0 to 0xe023dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802812fc r4:864b1580 NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 29 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT Hardware name: ARM-Versatile Express Call trace: [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c arch/arm/kernel/traps.c:257) r7:60000193 r6:60000193 r5:8231e0b0 r4:00000000 [<80201af0>] (show_stack) from [<8021e34c>] (__dump_stack lib/dump_stack.c:94 [inline]) [<80201af0>] (show_stack) from [<8021e34c>] (dump_stack_lvl+0x5c/0x70 lib/dump_stack.c:120) [<8021e2f0>] (dump_stack_lvl) from [<8021e378>] (dump_stack+0x18/0x1c lib/dump_stack.c:129) r7:00000000 r6:00000113 r5:00000001 r4:00000001 [<8021e360>] (dump_stack) from [<81b01f74>] (nmi_cpu_backtrace+0x150/0x170 lib/nmi_backtrace.c:113) [<81b01e24>] (nmi_cpu_backtrace) from [<81b020c4>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8 lib/nmi_backtrace.c:62) r7:00000001 r6:82a0b550 r5:82a1a2b8 r4:ffffffff [<81b01f94>] (nmi_trigger_cpumask_backtrace) from [<8022f104>] (arch_trigger_cpumask_backtrace+0x18/0x1c arch/arm/kernel/smp.c:852) r9:82a0b6d8 r8:00000006 r7:00000048 r6:82cc3de4 r5:0000774f r4:00000048 [<8022f0ec>] (arch_trigger_cpumask_backtrace) from [<81b09c10>] (trigger_all_cpu_backtrace include/linux/nmi.h:162 [inline]) [<8022f0ec>] (arch_trigger_cpumask_backtrace) from [<81b09c10>] (__sys_info lib/sys_info.c:157 [inline]) [<8022f0ec>] (arch_trigger_cpumask_backtrace) from [<81b09c10>] (sys_info+0x68/0xa8 lib/sys_info.c:165) [<81b09ba8>] (sys_info) from [<8038a87c>] (check_hung_uninterruptible_tasks kernel/hung_task.c:353 [inline]) [<81b09ba8>] (sys_info) from [<8038a87c>] (watchdog+0x3a0/0x84c kernel/hung_task.c:561) r5:0000774f r4:0000000a [<8038a4dc>] (watchdog) from [<80281418>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:df819e58 r8:83352680 r7:00000000 r6:8038a4dc r5:833a0c40 r4:831f7480 [<802812fc>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf8d5fb0 to 0xdf8d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802812fc r4:831f7480 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 2821 Comm: pr/ttyAMA-1 Not tainted syzkaller #0 PREEMPT Hardware name: ARM-Versatile Express PC is at __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:179 [inline] PC is at _raw_spin_unlock_irqrestore+0x28/0x54 kernel/locking/spinlock.c:198 LR is at spin_unlock_irqrestore include/linux/spinlock.h:408 [inline] LR is at __uart_port_unlock_irqrestore include/linux/serial_core.h:616 [inline] LR is at pl011_console_device_unlock+0x20/0x24 drivers/tty/serial/amba-pl011.c:2668 pc : [<81b22f40>] lr : [<80ae76a8>] psr: 600f0013 sp : eb4a5ec8 ip : eb4a5ed8 fp : eb4a5ed4 r10: 82b59524 r9 : 00000000 r8 : 00000000 r7 : 00000117 r6 : 82b59488 r5 : 00000000 r4 : 00000001 r3 : 00000888 r2 : 00000000 r1 : 600f0013 r0 : 847d9040 Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user Control: 30c5387d Table: 84d21740 DAC: fffffffd Call trace: [<81b22f18>] (_raw_spin_unlock_irqrestore) from [<80ae76a8>] (spin_unlock_irqrestore include/linux/spinlock.h:408 [inline]) [<81b22f18>] (_raw_spin_unlock_irqrestore) from [<80ae76a8>] (__uart_port_unlock_irqrestore include/linux/serial_core.h:616 [inline]) [<81b22f18>] (_raw_spin_unlock_irqrestore) from [<80ae76a8>] (pl011_console_device_unlock+0x20/0x24 drivers/tty/serial/amba-pl011.c:2668) [<80ae7688>] (pl011_console_device_unlock) from [<802e87f0>] (nbcon_emit_one+0x88/0x100 kernel/printk/nbcon.c:1165) [<802e8768>] (nbcon_emit_one) from [<802e8a70>] (nbcon_kthread_func+0x208/0x2ec kernel/printk/nbcon.c:1271) r6:82cc02d4 r5:82b59488 r4:851bb100 [<802e8868>] (nbcon_kthread_func) from [<80281418>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:df8ddb38 r8:84eeb400 r7:82b59488 r6:802e8868 r5:851bb100 r4:838c5640 [<802812fc>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4a5fb0 to 0xeb4a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802812fc r4:838c5640