INFO: task kworker/0:2:97 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:2 state:D stack:0 pid:97 tgid:97 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3ed30>] (__schedule_loop kernel/sched/core.c:7043 [inline]) [<81a3dd9c>] (__schedule) from [<81a3ed30>] (schedule+0x2c/0x130 kernel/sched/core.c:7058) r10:df9a1d84 r9:00000002 r8:60000013 r7:82916594 r6:df9a1d8c r5:83b06000 r4:83b06000 [<81a3ed04>] (schedule) from [<81a3f118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7115) r5:83b06000 r4:82916590 [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a41978>] (__mutex_lock.constprop.0) from [<81a42470>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9a1e08 r4:00000000 [<81a4245c>] (__mutex_lock_slowpath) from [<81a424b0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a42474>] (mutex_lock) from [<804e0660>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cb0200 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:83b06000 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dfa1f000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:84d74f8c r4:83933180 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:84d74f8c r4:83933180 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b06000 r8:839331ac r7:82804d40 r6:dddced40 r5:dddced60 r4:83933180 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:83933180 r8:8027ade4 r7:df83de60 r6:83834d80 r5:83b06000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9a1fb0 to 0xdf9a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:83934340 INFO: task kworker/0:2:97 is blocked on a mutex likely owned by task kworker/0:60:4511. task:kworker/0:60 state:R running task stack:0 pid:4511 tgid:4511 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3f164>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7288) r10:8280c9b4 r9:84c3c800 r8:80200c04 r7:dfdddd54 r6:ffffffff r5:84c3c800 r4:00000000 [<81a3f124>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfdddd20 to 0xdfdddd68) dd20: dec0e000 eb559000 00000001 80239bb8 7f00d000 00000001 82ac8f44 82ac8320 dd40: 7f00d000 eb559000 8280c9b4 dfdddd9c dfdddda0 dfdddd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e0424>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82ac8f64 [<804e01a0>] (__purge_vmap_area_lazy) from [<804e07dc>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfddddc0 r5:dfddde08 r4:dfddddc0 [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cae6c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:84c3c800 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dfc85000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:8553e78c r4:84dcbe80 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:8553e78c r4:84dcbe80 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c3c800 r8:84dcbeac r7:82804d40 r6:dddced40 r5:dddced60 r4:84dcbe80 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84dcbe80 r8:8027ade4 r7:dfa49e60 r6:84dcee80 r5:84c3c800 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfdddfb0 to 0xdfdddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84cae040 INFO: task kworker/1:10:4039 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:10 state:D stack:0 pid:4039 tgid:4039 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3ed30>] (__schedule_loop kernel/sched/core.c:7043 [inline]) [<81a3dd9c>] (__schedule) from [<81a3ed30>] (schedule+0x2c/0x130 kernel/sched/core.c:7058) r10:dfac9d84 r9:00000002 r8:60000013 r7:82916594 r6:dfac9d8c r5:83b5e000 r4:83b5e000 [<81a3ed04>] (schedule) from [<81a3f118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7115) r5:83b5e000 r4:82916590 [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a41978>] (__mutex_lock.constprop.0) from [<81a42470>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfac9e08 r4:00000000 [<81a4245c>] (__mutex_lock_slowpath) from [<81a424b0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a42474>] (mutex_lock) from [<804e0660>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bdfec0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018205 r8:83b5e000 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:df9b9000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:84ffe78c r4:84f2be00 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:ddde2d40 r6:83018200 r5:84ffe78c r4:84f2be00 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b5e000 r8:84f2be2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84f2be00 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84f2be00 r8:8027ade4 r7:dfa95e60 r6:84d61e00 r5:83b5e000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfac9fb0 to 0xdfac9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84cf9540 INFO: task kworker/1:10:4039 is blocked on a mutex likely owned by task kworker/0:60:4511. task:kworker/0:60 state:R running task stack:0 pid:4511 tgid:4511 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3f164>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7288) r10:8280c9b4 r9:84c3c800 r8:80200c04 r7:dfdddd54 r6:ffffffff r5:84c3c800 r4:00000000 [<81a3f124>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfdddd20 to 0xdfdddd68) dd20: df96b000 eb559000 00000001 80239bb8 7f00d000 00000001 82ac8f44 82ac8320 dd40: 7f00d000 eb559000 8280c9b4 dfdddd9c dfdddda0 dfdddd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e0424>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82ac8f64 [<804e01a0>] (__purge_vmap_area_lazy) from [<804e07dc>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfddddc0 r5:dfddde08 r4:dfddddc0 [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cae6c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:84c3c800 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dfc85000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:8553e78c r4:84dcbe80 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:8553e78c r4:84dcbe80 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c3c800 r8:84dcbeac r7:82804d40 r6:dddced40 r5:dddced60 r4:84dcbe80 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84dcbe80 r8:8027ade4 r7:dfa49e60 r6:84dcee80 r5:84c3c800 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfdddfb0 to 0xdfdddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84cae040 INFO: task kworker/0:13:4049 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:13 state:D stack:0 pid:4049 tgid:4049 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3ed30>] (__schedule_loop kernel/sched/core.c:7043 [inline]) [<81a3dd9c>] (__schedule) from [<81a3ed30>] (schedule+0x2c/0x130 kernel/sched/core.c:7058) r10:dfa49d84 r9:00000002 r8:60000013 r7:82916594 r6:dfa49d8c r5:84b3b000 r4:84b3b000 [<81a3ed04>] (schedule) from [<81a3f118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7115) r5:84b3b000 r4:82916590 [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a41978>] (__mutex_lock.constprop.0) from [<81a42470>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa49e08 r4:00000000 [<81a4245c>] (__mutex_lock_slowpath) from [<81a424b0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a42474>] (mutex_lock) from [<804e0660>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84caef80 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:84b3b000 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dfe25000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:8553cf8c r4:84d61f80 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:8553cf8c r4:84d61f80 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b3b000 r8:84d61fac r7:82804d40 r6:dddced40 r5:dddced60 r4:84d61f80 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84d61f80 r8:8027ade4 r7:dfaa5e60 r6:84d61700 r5:84b3b000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa49fb0 to 0xdfa49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84bdf0c0 INFO: task kworker/0:13:4049 is blocked on a mutex likely owned by task kworker/0:60:4511. task:kworker/0:60 state:R running task stack:0 pid:4511 tgid:4511 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3f164>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7288) r10:8280c9b4 r9:84c3c800 r8:80200c04 r7:dfdddd54 r6:ffffffff r5:84c3c800 r4:00000000 [<81a3f124>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfdddd20 to 0xdfdddd68) dd20: dfa15000 eb559000 00000001 80239bb8 7f00d000 00000001 82ac8f44 82ac8320 dd40: 7f00d000 eb559000 8280c9b4 dfdddd9c dfdddda0 dfdddd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e0424>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82ac8f64 [<804e01a0>] (__purge_vmap_area_lazy) from [<804e07dc>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfddddc0 r5:dfddde08 r4:dfddddc0 [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cae6c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:84c3c800 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dfc85000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:8553e78c r4:84dcbe80 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:8553e78c r4:84dcbe80 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c3c800 r8:84dcbeac r7:82804d40 r6:dddced40 r5:dddced60 r4:84dcbe80 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84dcbe80 r8:8027ade4 r7:dfa49e60 r6:84dcee80 r5:84c3c800 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfdddfb0 to 0xdfdddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84cae040 INFO: task kworker/1:11:4059 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:11 state:D stack:0 pid:4059 tgid:4059 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3ed30>] (__schedule_loop kernel/sched/core.c:7043 [inline]) [<81a3dd9c>] (__schedule) from [<81a3ed30>] (schedule+0x2c/0x130 kernel/sched/core.c:7058) r10:dfae5d84 r9:00000002 r8:60000013 r7:82916594 r6:dfae5d8c r5:84b3c800 r4:84b3c800 [<81a3ed04>] (schedule) from [<81a3f118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7115) r5:84b3c800 r4:82916590 [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a41978>] (__mutex_lock.constprop.0) from [<81a42470>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfae5e08 r4:00000000 [<81a4245c>] (__mutex_lock_slowpath) from [<81a424b0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a42474>] (mutex_lock) from [<804e0660>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e0af00 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018205 r8:84b3c800 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dfd77000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:84ffc78c r4:84f2bb00 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:ddde2d40 r6:83018200 r5:84ffc78c r4:84f2bb00 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b3c800 r8:84f2bb2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84f2bb00 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84f2bb00 r8:8027ade4 r7:dfac9e60 r6:84d83000 r5:84b3c800 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfae5fb0 to 0xdfae5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:848d6640 INFO: task kworker/1:11:4059 is blocked on a mutex likely owned by task kworker/0:60:4511. task:kworker/0:60 state:R running task stack:0 pid:4511 tgid:4511 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3f164>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7288) r10:8280c9b4 r9:84c3c800 r8:80200c04 r7:dfdddd54 r6:ffffffff r5:84c3c800 r4:00000000 [<81a3f124>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfdddd20 to 0xdfdddd68) dd20: dfa15000 eb559000 00000001 80239bb8 7f00d000 00000001 82ac8f44 82ac8320 dd40: 7f00d000 eb559000 8280c9b4 dfdddd9c dfdddda0 dfdddd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e0424>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82ac8f64 [<804e01a0>] (__purge_vmap_area_lazy) from [<804e07dc>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfddddc0 r5:dfddde08 r4:dfddddc0 [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cae6c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:84c3c800 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dfc85000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:8553e78c r4:84dcbe80 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:8553e78c r4:84dcbe80 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c3c800 r8:84dcbeac r7:82804d40 r6:dddced40 r5:dddced60 r4:84dcbe80 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84dcbe80 r8:8027ade4 r7:dfa49e60 r6:84dcee80 r5:84c3c800 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfdddfb0 to 0xdfdddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84cae040 INFO: task kworker/1:12:4071 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:12 state:D stack:0 pid:4071 tgid:4071 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3ed30>] (__schedule_loop kernel/sched/core.c:7043 [inline]) [<81a3dd9c>] (__schedule) from [<81a3ed30>] (schedule+0x2c/0x130 kernel/sched/core.c:7058) r10:dfb0dd84 r9:00000002 r8:60000013 r7:82916594 r6:dfb0dd8c r5:83b0bc00 r4:83b0bc00 [<81a3ed04>] (schedule) from [<81a3f118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7115) r5:83b0bc00 r4:82916590 [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a41978>] (__mutex_lock.constprop.0) from [<81a42470>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb0de08 r4:00000000 [<81a4245c>] (__mutex_lock_slowpath) from [<81a424b0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a42474>] (mutex_lock) from [<804e0660>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e0ab80 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018205 r8:83b0bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dfcef000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:84d7438c r4:84f2b800 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:ddde2d40 r6:83018200 r5:84d7438c r4:84f2b800 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b0bc00 r8:84f2b82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84f2b800 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84f2b800 r8:8027ade4 r7:dfac9e60 r6:84d83580 r5:83b0bc00 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb0dfb0 to 0xdfb0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:848d6840 INFO: task kworker/1:12:4071 is blocked on a mutex likely owned by task kworker/0:60:4511. task:kworker/0:60 state:R running task stack:0 pid:4511 tgid:4511 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3f164>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7288) r10:8280c9b4 r9:84c3c800 r8:80200c04 r7:dfdddd54 r6:ffffffff r5:84c3c800 r4:00000000 [<81a3f124>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfdddd20 to 0xdfdddd68) dd20: dfa15000 eb559000 00000001 80239bb8 7f00d000 00000001 82ac8f44 82ac8320 dd40: 7f00d000 eb559000 8280c9b4 dfdddd9c dfdddda0 dfdddd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e0424>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82ac8f64 [<804e01a0>] (__purge_vmap_area_lazy) from [<804e07dc>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfddddc0 r5:dfddde08 r4:dfddddc0 [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cae6c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:84c3c800 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dfc85000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:8553e78c r4:84dcbe80 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:8553e78c r4:84dcbe80 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c3c800 r8:84dcbeac r7:82804d40 r6:dddced40 r5:dddced60 r4:84dcbe80 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84dcbe80 r8:8027ade4 r7:dfa49e60 r6:84dcee80 r5:84c3c800 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfdddfb0 to 0xdfdddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84cae040 INFO: task kworker/1:90:4484 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:90 state:D stack:0 pid:4484 tgid:4484 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3ed30>] (__schedule_loop kernel/sched/core.c:7043 [inline]) [<81a3dd9c>] (__schedule) from [<81a3ed30>] (schedule+0x2c/0x130 kernel/sched/core.c:7058) r10:dfd71d84 r9:00000002 r8:60000113 r7:82916594 r6:dfd71d8c r5:84c39800 r4:84c39800 [<81a3ed04>] (schedule) from [<81a3f118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7115) r5:84c39800 r4:82916590 [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a41978>] (__mutex_lock.constprop.0) from [<81a42470>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd71e08 r4:00000000 [<81a4245c>] (__mutex_lock_slowpath) from [<81a424b0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a42474>] (mutex_lock) from [<804e0660>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e0ac00 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018205 r8:84c39800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dfc0f000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:84e44f8c r4:84dce900 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:ddde2d40 r6:83018200 r5:84e44f8c r4:84dce900 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c39800 r8:84dce92c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84dce900 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84dce900 r8:8027ade4 r7:dfd3de60 r6:84dce980 r5:84c39800 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd71fb0 to 0xdfd71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84ca8d80 INFO: task kworker/1:90:4484 is blocked on a mutex likely owned by task kworker/0:60:4511. task:kworker/0:60 state:R running task stack:0 pid:4511 tgid:4511 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3f164>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7288) r10:8280c9b4 r9:84c3c800 r8:80200c04 r7:dfdddd54 r6:ffffffff r5:84c3c800 r4:00000000 [<81a3f124>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfdddd20 to 0xdfdddd68) dd20: dfa15000 eb559000 00000001 80239bb8 7f00d000 00000001 82ac8f44 82ac8320 dd40: 7f00d000 eb559000 8280c9b4 dfdddd9c dfdddda0 dfdddd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e0424>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82ac8f64 [<804e01a0>] (__purge_vmap_area_lazy) from [<804e07dc>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfddddc0 r5:dfddde08 r4:dfddddc0 [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cae6c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:84c3c800 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dfc85000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:8553e78c r4:84dcbe80 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:8553e78c r4:84dcbe80 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c3c800 r8:84dcbeac r7:82804d40 r6:dddced40 r5:dddced60 r4:84dcbe80 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84dcbe80 r8:8027ade4 r7:dfa49e60 r6:84dcee80 r5:84c3c800 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfdddfb0 to 0xdfdddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84cae040 INFO: task kworker/1:92:4492 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:92 state:D stack:0 pid:4492 tgid:4492 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3ed30>] (__schedule_loop kernel/sched/core.c:7043 [inline]) [<81a3dd9c>] (__schedule) from [<81a3ed30>] (schedule+0x2c/0x130 kernel/sched/core.c:7058) r10:dfd95d84 r9:00000002 r8:60000013 r7:82916594 r6:dfd95d8c r5:84c3bc00 r4:84c3bc00 [<81a3ed04>] (schedule) from [<81a3f118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7115) r5:84c3bc00 r4:82916590 [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a41978>] (__mutex_lock.constprop.0) from [<81a42470>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd95e08 r4:00000000 [<81a4245c>] (__mutex_lock_slowpath) from [<81a424b0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a42474>] (mutex_lock) from [<804e0660>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84caff00 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018205 r8:84c3bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dfe71000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:84ffdb8c r4:84dceb00 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:ddde2d40 r6:83018200 r5:84ffdb8c r4:84dceb00 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c3bc00 r8:84dceb2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84dceb00 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84dceb00 r8:8027ade4 r7:dfd71e60 r6:84dceb80 r5:84c3bc00 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd95fb0 to 0xdfd95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:848f3380 INFO: task kworker/1:92:4492 is blocked on a mutex likely owned by task kworker/0:60:4511. task:kworker/0:60 state:R running task stack:0 pid:4511 tgid:4511 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3f164>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7288) r10:8280c9b4 r9:84c3c800 r8:80200c04 r7:dfdddd54 r6:ffffffff r5:84c3c800 r4:00000000 [<81a3f124>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfdddd20 to 0xdfdddd68) dd20: dfa15000 eb559000 00000001 80239bb8 7f00d000 00000001 82ac8f44 82ac8320 dd40: 7f00d000 eb559000 8280c9b4 dfdddd9c dfdddda0 dfdddd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e0424>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82ac8f64 [<804e01a0>] (__purge_vmap_area_lazy) from [<804e07dc>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfddddc0 r5:dfddde08 r4:dfddddc0 [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cae6c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:84c3c800 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dfc85000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:8553e78c r4:84dcbe80 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:8553e78c r4:84dcbe80 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c3c800 r8:84dcbeac r7:82804d40 r6:dddced40 r5:dddced60 r4:84dcbe80 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84dcbe80 r8:8027ade4 r7:dfa49e60 r6:84dcee80 r5:84c3c800 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfdddfb0 to 0xdfdddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84cae040 INFO: task kworker/0:61:4514 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:61 state:D stack:0 pid:4514 tgid:4514 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3ed30>] (__schedule_loop kernel/sched/core.c:7043 [inline]) [<81a3dd9c>] (__schedule) from [<81a3ed30>] (schedule+0x2c/0x130 kernel/sched/core.c:7058) r10:dfe05d84 r9:00000002 r8:60000013 r7:82916594 r6:dfe05d8c r5:84c38000 r4:84c38000 [<81a3ed04>] (schedule) from [<81a3f118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7115) r5:84c38000 r4:82916590 [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a41978>] (__mutex_lock.constprop.0) from [<81a42470>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe05e08 r4:00000000 [<81a4245c>] (__mutex_lock_slowpath) from [<81a424b0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a42474>] (mutex_lock) from [<804e0660>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cae840 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:84c38000 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dfd1b000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:8553fb8c r4:84dcbf00 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:8553fb8c r4:84dcbf00 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c38000 r8:84dcbf2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84dcbf00 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84dcbf00 r8:8027ade4 r7:dfa49e60 r6:84dcef80 r5:84c38000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe05fb0 to 0xdfe05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84cae040 INFO: task kworker/0:61:4514 is blocked on a mutex likely owned by task kworker/0:60:4511. task:kworker/0:60 state:R running task stack:0 pid:4511 tgid:4511 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3f164>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7288) r10:8280c9b4 r9:84c3c800 r8:80200c04 r7:dfdddd54 r6:ffffffff r5:84c3c800 r4:00000000 [<81a3f124>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfdddd20 to 0xdfdddd68) dd20: dfa15000 eb559000 00000001 80239bb8 7f00d000 00000001 82ac8f44 82ac8320 dd40: 7f00d000 eb559000 8280c9b4 dfdddd9c dfdddda0 dfdddd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e0424>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82ac8f64 [<804e01a0>] (__purge_vmap_area_lazy) from [<804e07dc>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfddddc0 r5:dfddde08 r4:dfddddc0 [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cae6c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:84c3c800 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dfc85000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:8553e78c r4:84dcbe80 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:8553e78c r4:84dcbe80 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c3c800 r8:84dcbeac r7:82804d40 r6:dddced40 r5:dddced60 r4:84dcbe80 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84dcbe80 r8:8027ade4 r7:dfa49e60 r6:84dcee80 r5:84c3c800 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfdddfb0 to 0xdfdddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84cae040 INFO: task kworker/0:62:4517 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:62 state:D stack:0 pid:4517 tgid:4517 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3ed30>] (__schedule_loop kernel/sched/core.c:7043 [inline]) [<81a3dd9c>] (__schedule) from [<81a3ed30>] (schedule+0x2c/0x130 kernel/sched/core.c:7058) r10:dfe01d84 r9:00000002 r8:60000013 r7:82916594 r6:dfe01d8c r5:85570000 r4:85570000 [<81a3ed04>] (schedule) from [<81a3f118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7115) r5:85570000 r4:82916590 [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a41978>] (__mutex_lock.constprop.0) from [<81a42470>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe01e08 r4:00000000 [<81a4245c>] (__mutex_lock_slowpath) from [<81a424b0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a42474>] (mutex_lock) from [<804e0660>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84caea00 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:85570000 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dfdcd000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:8553ff8c r4:84dcbf80 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:8553ff8c r4:84dcbf80 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85570000 r8:84dcbfac r7:82804d40 r6:dddced40 r5:dddced60 r4:84dcbf80 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84dcbf80 r8:8027ade4 r7:dfa49e60 r6:84e0f000 r5:85570000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe01fb0 to 0xdfe01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84cae040 INFO: task kworker/0:62:4517 is blocked on a mutex likely owned by task kworker/0:60:4511. task:kworker/0:60 state:R running task stack:0 pid:4511 tgid:4511 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3f164>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7288) r10:8280c9b4 r9:84c3c800 r8:80200c04 r7:dfdddd54 r6:ffffffff r5:84c3c800 r4:00000000 [<81a3f124>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfdddd20 to 0xdfdddd68) dd20: dfa15000 eb559000 00000001 80239bb8 7f00d000 00000001 82ac8f44 82ac8320 dd40: 7f00d000 eb559000 8280c9b4 dfdddd9c dfdddda0 dfdddd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e0424>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82ac8f64 [<804e01a0>] (__purge_vmap_area_lazy) from [<804e07dc>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfddddc0 r5:dfddde08 r4:dfddddc0 [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cae6c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:84c3c800 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dfc85000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:8553e78c r4:84dcbe80 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:8553e78c r4:84dcbe80 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c3c800 r8:84dcbeac r7:82804d40 r6:dddced40 r5:dddced60 r4:84dcbe80 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84dcbe80 r8:8027ade4 r7:dfa49e60 r6:84dcee80 r5:84c3c800 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfdddfb0 to 0xdfdddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84cae040 INFO: task kworker/0:63:4520 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:63 state:D stack:0 pid:4520 tgid:4520 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3ed30>] (__schedule_loop kernel/sched/core.c:7043 [inline]) [<81a3dd9c>] (__schedule) from [<81a3ed30>] (schedule+0x2c/0x130 kernel/sched/core.c:7058) r10:dfdb5d84 r9:00000002 r8:60000013 r7:82916594 r6:dfdb5d8c r5:85576c00 r4:85576c00 [<81a3ed04>] (schedule) from [<81a3f118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7115) r5:85576c00 r4:82916590 [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a41978>] (__mutex_lock.constprop.0) from [<81a42470>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfdb5e08 r4:00000000 [<81a4245c>] (__mutex_lock_slowpath) from [<81a424b0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a42474>] (mutex_lock) from [<804e0660>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84caebc0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:85576c00 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dfe11000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:8553e38c r4:84e0f080 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:8553e38c r4:84e0f080 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85576c00 r8:84e0f0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84e0f080 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84e0f080 r8:8027ade4 r7:dfa49e60 r6:84e0f100 r5:85576c00 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfdb5fb0 to 0xdfdb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84cae040 INFO: task kworker/0:63:4520 is blocked on a mutex likely owned by task kworker/0:60:4511. task:kworker/0:60 state:R running task stack:0 pid:4511 tgid:4511 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3f164>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7288) r10:8280c9b4 r9:84c3c800 r8:80200c04 r7:dfdddd54 r6:ffffffff r5:84c3c800 r4:00000000 [<81a3f124>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfdddd20 to 0xdfdddd68) dd20: dfa15000 eb559000 00000001 80239bb8 7f00d000 00000001 82ac8f44 82ac8320 dd40: 7f00d000 eb559000 8280c9b4 dfdddd9c dfdddda0 dfdddd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e0424>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82ac8f64 [<804e01a0>] (__purge_vmap_area_lazy) from [<804e07dc>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfddddc0 r5:dfddde08 r4:dfddddc0 [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cae6c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:84c3c800 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dfc85000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:8553e78c r4:84dcbe80 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:8553e78c r4:84dcbe80 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c3c800 r8:84dcbeac r7:82804d40 r6:dddced40 r5:dddced60 r4:84dcbe80 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84dcbe80 r8:8027ade4 r7:dfa49e60 r6:84dcee80 r5:84c3c800 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfdddfb0 to 0xdfdddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84cae040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:64:4523 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:64 state:D stack:0 pid:4523 tgid:4523 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3ed30>] (__schedule_loop kernel/sched/core.c:7043 [inline]) [<81a3dd9c>] (__schedule) from [<81a3ed30>] (schedule+0x2c/0x130 kernel/sched/core.c:7058) r10:dfe0dd84 r9:00000002 r8:60000013 r7:82916594 r6:dfe0dd8c r5:84c4ec00 r4:84c4ec00 [<81a3ed04>] (schedule) from [<81a3f118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7115) r5:84c4ec00 r4:82916590 [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a41978>] (__mutex_lock.constprop.0) from [<81a42470>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe0de08 r4:00000000 [<81a4245c>] (__mutex_lock_slowpath) from [<81a424b0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a42474>] (mutex_lock) from [<804e0660>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84caf280 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:84c4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dfb11000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:84ffdf8c r4:84e0f180 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:84ffdf8c r4:84e0f180 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c4ec00 r8:84e0f1ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84e0f180 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84e0f180 r8:8027ade4 r7:dfa49e60 r6:84e0f200 r5:84c4ec00 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe0dfb0 to 0xdfe0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84cae040 INFO: task kworker/0:64:4523 is blocked on a mutex likely owned by task kworker/0:60:4511. task:kworker/0:60 state:R running task stack:0 pid:4511 tgid:4511 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3f164>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7288) r10:8280c9b4 r9:84c3c800 r8:80200c04 r7:dfdddd54 r6:ffffffff r5:84c3c800 r4:00000000 [<81a3f124>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfdddd20 to 0xdfdddd68) dd20: dfa15000 eb559000 00000001 80239bb8 7f00d000 00000001 82ac8f44 82ac8320 dd40: 7f00d000 eb559000 8280c9b4 dfdddd9c dfdddda0 dfdddd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e0424>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82ac8f64 [<804e01a0>] (__purge_vmap_area_lazy) from [<804e07dc>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfddddc0 r5:dfddde08 r4:dfddddc0 [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cae6c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:84c3c800 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dfc85000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:8553e78c r4:84dcbe80 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:8553e78c r4:84dcbe80 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c3c800 r8:84dcbeac r7:82804d40 r6:dddced40 r5:dddced60 r4:84dcbe80 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84dcbe80 r8:8027ade4 r7:dfa49e60 r6:84dcee80 r5:84c3c800 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfdddfb0 to 0xdfdddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84cae040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:65:4526 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:65 state:D stack:0 pid:4526 tgid:4526 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3ed30>] (__schedule_loop kernel/sched/core.c:7043 [inline]) [<81a3dd9c>] (__schedule) from [<81a3ed30>] (schedule+0x2c/0x130 kernel/sched/core.c:7058) r10:dfe29d84 r9:00000002 r8:60000013 r7:82916594 r6:dfe29d8c r5:85590c00 r4:85590c00 [<81a3ed04>] (schedule) from [<81a3f118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7115) r5:85590c00 r4:82916590 [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a41978>] (__mutex_lock.constprop.0) from [<81a42470>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe29e08 r4:00000000 [<81a4245c>] (__mutex_lock_slowpath) from [<81a424b0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a42474>] (mutex_lock) from [<804e0660>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfa140 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:85590c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dfe39000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:8553c78c r4:84e0f300 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:8553c78c r4:84e0f300 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85590c00 r8:84e0f32c r7:82804d40 r6:dddced40 r5:dddced60 r4:84e0f300 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84e0f300 r8:8027ade4 r7:dfe0de60 r6:84e0f380 r5:85590c00 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe29fb0 to 0xdfe29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84caec80 INFO: task kworker/0:65:4526 is blocked on a mutex likely owned by task kworker/0:60:4511. task:kworker/0:60 state:R running task stack:0 pid:4511 tgid:4511 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3f164>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7288) r10:8280c9b4 r9:84c3c800 r8:80200c04 r7:dfdddd54 r6:ffffffff r5:84c3c800 r4:00000000 [<81a3f124>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfdddd20 to 0xdfdddd68) dd20: dfa15000 eb559000 00000001 80239bb8 7f00d000 00000001 82ac8f44 82ac8320 dd40: 7f00d000 eb559000 8280c9b4 dfdddd9c dfdddda0 dfdddd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e0424>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82ac8f64 [<804e01a0>] (__purge_vmap_area_lazy) from [<804e07dc>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfddddc0 r5:dfddde08 r4:dfddddc0 [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cae6c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:84c3c800 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dfc85000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:8553e78c r4:84dcbe80 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:8553e78c r4:84dcbe80 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c3c800 r8:84dcbeac r7:82804d40 r6:dddced40 r5:dddced60 r4:84dcbe80 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84dcbe80 r8:8027ade4 r7:dfa49e60 r6:84dcee80 r5:84c3c800 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfdddfb0 to 0xdfdddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84cae040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:66:4531 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:66 state:D stack:0 pid:4531 tgid:4531 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3ed30>] (__schedule_loop kernel/sched/core.c:7043 [inline]) [<81a3dd9c>] (__schedule) from [<81a3ed30>] (schedule+0x2c/0x130 kernel/sched/core.c:7058) r10:dfe41d84 r9:00000002 r8:60000113 r7:82916594 r6:dfe41d8c r5:85592400 r4:85592400 [<81a3ed04>] (schedule) from [<81a3f118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7115) r5:85592400 r4:82916590 [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a41978>] (__mutex_lock.constprop.0) from [<81a42470>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe41e08 r4:00000000 [<81a4245c>] (__mutex_lock_slowpath) from [<81a424b0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a42474>] (mutex_lock) from [<804e0660>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cb0400 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:85592400 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dfe81000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:84fc8b8c r4:84e0f400 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:84fc8b8c r4:84e0f400 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85592400 r8:84e0f42c r7:82804d40 r6:dddced40 r5:dddced60 r4:84e0f400 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84e0f400 r8:8027ade4 r7:dfe0de60 r6:84cac000 r5:85592400 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe41fb0 to 0xdfe41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:8547fe80 INFO: task kworker/0:66:4531 is blocked on a mutex likely owned by task kworker/0:60:4511. task:kworker/0:60 state:R running task stack:0 pid:4511 tgid:4511 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3f164>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7288) r10:8280c9b4 r9:84c3c800 r8:80200c04 r7:dfdddd54 r6:ffffffff r5:84c3c800 r4:00000000 [<81a3f124>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfdddd20 to 0xdfdddd68) dd20: dfa15000 eb559000 00000001 80239bb8 7f00d000 00000001 82ac8f44 82ac8320 dd40: 7f00d000 eb559000 8280c9b4 dfdddd9c dfdddda0 dfdddd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e0424>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82ac8f64 [<804e01a0>] (__purge_vmap_area_lazy) from [<804e07dc>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfddddc0 r5:dfddde08 r4:dfddddc0 [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cae6c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:84c3c800 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dfc85000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:8553e78c r4:84dcbe80 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:8553e78c r4:84dcbe80 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c3c800 r8:84dcbeac r7:82804d40 r6:dddced40 r5:dddced60 r4:84dcbe80 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84dcbe80 r8:8027ade4 r7:dfa49e60 r6:84dcee80 r5:84c3c800 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfdddfb0 to 0xdfdddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84cae040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:94:4536 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:94 state:D stack:0 pid:4536 tgid:4536 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3ed30>] (__schedule_loop kernel/sched/core.c:7043 [inline]) [<81a3dd9c>] (__schedule) from [<81a3ed30>] (schedule+0x2c/0x130 kernel/sched/core.c:7058) r10:dfe49d84 r9:00000002 r8:60000013 r7:82916594 r6:dfe49d8c r5:85598c00 r4:85598c00 [<81a3ed04>] (schedule) from [<81a3f118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7115) r5:85598c00 r4:82916590 [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a41978>] (__mutex_lock.constprop.0) from [<81a42470>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe49e08 r4:00000000 [<81a4245c>] (__mutex_lock_slowpath) from [<81a424b0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a42474>] (mutex_lock) from [<804e0660>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e0a680 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018205 r8:85598c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dfe51000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:84ffcf8c r4:84cac100 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:ddde2d40 r6:83018200 r5:84ffcf8c r4:84cac100 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85598c00 r8:84cac12c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84cac100 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84cac100 r8:8027ade4 r7:dfd95e60 r6:84cac180 r5:85598c00 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe49fb0 to 0xdfe49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84e0acc0 INFO: task kworker/1:94:4536 is blocked on a mutex likely owned by task kworker/0:60:4511. task:kworker/0:60 state:R running task stack:0 pid:4511 tgid:4511 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3f164>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7288) r10:8280c9b4 r9:84c3c800 r8:80200c04 r7:dfdddd54 r6:ffffffff r5:84c3c800 r4:00000000 [<81a3f124>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfdddd20 to 0xdfdddd68) dd20: dfa15000 eb559000 00000001 80239bb8 7f00d000 00000001 82ac8f44 82ac8320 dd40: 7f00d000 eb559000 8280c9b4 dfdddd9c dfdddda0 dfdddd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e0424>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82ac8f64 [<804e01a0>] (__purge_vmap_area_lazy) from [<804e07dc>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfddddc0 r5:dfddde08 r4:dfddddc0 [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cae6c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:84c3c800 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dfc85000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:8553e78c r4:84dcbe80 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:8553e78c r4:84dcbe80 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c3c800 r8:84dcbeac r7:82804d40 r6:dddced40 r5:dddced60 r4:84dcbe80 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84dcbe80 r8:8027ade4 r7:dfa49e60 r6:84dcee80 r5:84c3c800 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfdddfb0 to 0xdfdddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84cae040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:95:4541 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:95 state:D stack:0 pid:4541 tgid:4541 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3ed30>] (__schedule_loop kernel/sched/core.c:7043 [inline]) [<81a3dd9c>] (__schedule) from [<81a3ed30>] (schedule+0x2c/0x130 kernel/sched/core.c:7058) r10:dfe55d84 r9:00000002 r8:60000113 r7:82916594 r6:dfe55d8c r5:85599800 r4:85599800 [<81a3ed04>] (schedule) from [<81a3f118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7115) r5:85599800 r4:82916590 [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a41978>] (__mutex_lock.constprop.0) from [<81a42470>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe55e08 r4:00000000 [<81a4245c>] (__mutex_lock_slowpath) from [<81a424b0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a42474>] (mutex_lock) from [<804e0660>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e0a640 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018205 r8:85599800 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dfe61000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:84ffd38c r4:84cac200 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:ddde2d40 r6:83018200 r5:84ffd38c r4:84cac200 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85599800 r8:84cac22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84cac200 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84cac200 r8:8027ade4 r7:dfd95e60 r6:84cac280 r5:85599800 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe55fb0 to 0xdfe55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84e0a480 INFO: task kworker/1:95:4541 is blocked on a mutex likely owned by task kworker/0:60:4511. task:kworker/0:60 state:R running task stack:0 pid:4511 tgid:4511 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3f164>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7288) r10:8280c9b4 r9:84c3c800 r8:80200c04 r7:dfdddd54 r6:ffffffff r5:84c3c800 r4:00000000 [<81a3f124>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfdddd20 to 0xdfdddd68) dd20: dfa15000 eb559000 00000001 80239bb8 7f00d000 00000001 82ac8f44 82ac8320 dd40: 7f00d000 eb559000 8280c9b4 dfdddd9c dfdddda0 dfdddd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e0424>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82ac8f64 [<804e01a0>] (__purge_vmap_area_lazy) from [<804e07dc>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfddddc0 r5:dfddde08 r4:dfddddc0 [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cae6c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:84c3c800 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dfc85000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:8553e78c r4:84dcbe80 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:8553e78c r4:84dcbe80 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c3c800 r8:84dcbeac r7:82804d40 r6:dddced40 r5:dddced60 r4:84dcbe80 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84dcbe80 r8:8027ade4 r7:dfa49e60 r6:84dcee80 r5:84c3c800 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfdddfb0 to 0xdfdddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84cae040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:96:4542 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:96 state:D stack:0 pid:4542 tgid:4542 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3ed30>] (__schedule_loop kernel/sched/core.c:7043 [inline]) [<81a3dd9c>] (__schedule) from [<81a3ed30>] (schedule+0x2c/0x130 kernel/sched/core.c:7058) r10:dfe65d84 r9:00000002 r8:60000013 r7:82916594 r6:dfe65d8c r5:8559a400 r4:8559a400 [<81a3ed04>] (schedule) from [<81a3f118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7115) r5:8559a400 r4:82916590 [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a41978>] (__mutex_lock.constprop.0) from [<81a42470>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe65e08 r4:00000000 [<81a4245c>] (__mutex_lock_slowpath) from [<81a424b0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a42474>] (mutex_lock) from [<804e0660>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848f3100 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018205 r8:8559a400 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dfd9b000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:84fff78c r4:84cac300 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:ddde2d40 r6:83018200 r5:84fff78c r4:84cac300 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8559a400 r8:84cac32c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84cac300 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84cac300 r8:8027ade4 r7:dfd95e60 r6:84cac380 r5:8559a400 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe65fb0 to 0xdfe65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84e0a740 INFO: task kworker/1:96:4542 is blocked on a mutex likely owned by task kworker/0:60:4511. task:kworker/0:60 state:R running task stack:0 pid:4511 tgid:4511 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3f164>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7288) r10:8280c9b4 r9:84c3c800 r8:80200c04 r7:dfdddd54 r6:ffffffff r5:84c3c800 r4:00000000 [<81a3f124>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfdddd20 to 0xdfdddd68) dd20: dfa15000 eb559000 00000001 80239bb8 7f00d000 00000001 82ac8f44 82ac8320 dd40: 7f00d000 eb559000 8280c9b4 dfdddd9c dfdddda0 dfdddd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e0424>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82ac8f64 [<804e01a0>] (__purge_vmap_area_lazy) from [<804e07dc>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfddddc0 r5:dfddde08 r4:dfddddc0 [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cae6c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:84c3c800 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dfc85000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:8553e78c r4:84dcbe80 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:8553e78c r4:84dcbe80 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c3c800 r8:84dcbeac r7:82804d40 r6:dddced40 r5:dddced60 r4:84dcbe80 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84dcbe80 r8:8027ade4 r7:dfa49e60 r6:84dcee80 r5:84c3c800 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfdddfb0 to 0xdfdddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84cae040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:97:4546 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:97 state:D stack:0 pid:4546 tgid:4546 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3ed30>] (__schedule_loop kernel/sched/core.c:7043 [inline]) [<81a3dd9c>] (__schedule) from [<81a3ed30>] (schedule+0x2c/0x130 kernel/sched/core.c:7058) r10:dfe75d84 r9:00000002 r8:60000013 r7:82916594 r6:dfe75d8c r5:8559b000 r4:8559b000 [<81a3ed04>] (schedule) from [<81a3f118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7115) r5:8559b000 r4:82916590 [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a41978>] (__mutex_lock.constprop.0) from [<81a42470>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe75e08 r4:00000000 [<81a4245c>] (__mutex_lock_slowpath) from [<81a424b0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a42474>] (mutex_lock) from [<804e0660>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848d6340 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018205 r8:8559b000 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dfc11000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:84ffef8c r4:84cac400 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:ddde2d40 r6:83018200 r5:84ffef8c r4:84cac400 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8559b000 r8:84cac42c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84cac400 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84cac400 r8:8027ade4 r7:dfe65e60 r6:84cac480 r5:8559b000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe75fb0 to 0xdfe75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84caf980 INFO: task kworker/1:97:4546 is blocked on a mutex likely owned by task kworker/0:60:4511. task:kworker/0:60 state:R running task stack:0 pid:4511 tgid:4511 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3f164>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7288) r10:8280c9b4 r9:84c3c800 r8:80200c04 r7:dfdddd54 r6:ffffffff r5:84c3c800 r4:00000000 [<81a3f124>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfdddd20 to 0xdfdddd68) dd20: dfa15000 eb559000 00000001 80239bb8 7f00d000 00000001 82ac8f44 82ac8320 dd40: 7f00d000 eb559000 8280c9b4 dfdddd9c dfdddda0 dfdddd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e0424>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82ac8f64 [<804e01a0>] (__purge_vmap_area_lazy) from [<804e07dc>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfddddc0 r5:dfddde08 r4:dfddddc0 [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cae6c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:84c3c800 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dfc85000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:8553e78c r4:84dcbe80 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:8553e78c r4:84dcbe80 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c3c800 r8:84dcbeac r7:82804d40 r6:dddced40 r5:dddced60 r4:84dcbe80 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84dcbe80 r8:8027ade4 r7:dfa49e60 r6:84dcee80 r5:84c3c800 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfdddfb0 to 0xdfdddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84cae040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:69:4555 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:69 state:D stack:0 pid:4555 tgid:4555 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3ed30>] (__schedule_loop kernel/sched/core.c:7043 [inline]) [<81a3dd9c>] (__schedule) from [<81a3ed30>] (schedule+0x2c/0x130 kernel/sched/core.c:7058) r10:dfe85d84 r9:00000002 r8:60000013 r7:82916594 r6:dfe85d8c r5:85593000 r4:85593000 [<81a3ed04>] (schedule) from [<81a3f118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7115) r5:85593000 r4:82916590 [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a41978>] (__mutex_lock.constprop.0) from [<81a42470>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe85e08 r4:00000000 [<81a4245c>] (__mutex_lock_slowpath) from [<81a424b0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a42474>] (mutex_lock) from [<804e0660>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cb0a00 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:85593000 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dfce3000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:8322e38c r4:84e0f580 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:8322e38c r4:84e0f580 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85593000 r8:84e0f5ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84e0f580 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84e0f580 r8:8027ade4 r7:dfe95e60 r6:84e0f600 r5:85593000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe85fb0 to 0xdfe85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84cb0180 INFO: task kworker/0:69:4555 is blocked on a mutex likely owned by task kworker/0:60:4511. task:kworker/0:60 state:R running task stack:0 pid:4511 tgid:4511 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3f164>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7288) r10:8280c9b4 r9:84c3c800 r8:80200c04 r7:dfdddd54 r6:ffffffff r5:84c3c800 r4:00000000 [<81a3f124>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfdddd20 to 0xdfdddd68) dd20: dfa15000 eb559000 00000001 80239bb8 7f00d000 00000001 82ac8f44 82ac8320 dd40: 7f00d000 eb559000 8280c9b4 dfdddd9c dfdddda0 dfdddd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e0424>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82ac8f64 [<804e01a0>] (__purge_vmap_area_lazy) from [<804e07dc>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfddddc0 r5:dfddde08 r4:dfddddc0 [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cae6c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:84c3c800 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dfc85000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:8553e78c r4:84dcbe80 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:8553e78c r4:84dcbe80 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c3c800 r8:84dcbeac r7:82804d40 r6:dddced40 r5:dddced60 r4:84dcbe80 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84dcbe80 r8:8027ade4 r7:dfa49e60 r6:84dcee80 r5:84c3c800 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfdddfb0 to 0xdfdddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84cae040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:98:4563 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:98 state:D stack:0 pid:4563 tgid:4563 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3ed30>] (__schedule_loop kernel/sched/core.c:7043 [inline]) [<81a3dd9c>] (__schedule) from [<81a3ed30>] (schedule+0x2c/0x130 kernel/sched/core.c:7058) r10:dfe4dd84 r9:00000002 r8:60000013 r7:82916594 r6:dfe4dd8c r5:85594800 r4:85594800 [<81a3ed04>] (schedule) from [<81a3f118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7115) r5:85594800 r4:82916590 [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a41978>] (__mutex_lock.constprop.0) from [<81a42470>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe4de08 r4:00000000 [<81a4245c>] (__mutex_lock_slowpath) from [<81a424b0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a42474>] (mutex_lock) from [<804e0660>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ca8040 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018205 r8:85594800 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dfd1d000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:84fff38c r4:84cac700 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:ddde2d40 r6:83018200 r5:84fff38c r4:84cac700 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85594800 r8:84cac72c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84cac700 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84cac700 r8:8027ade4 r7:dfe65e60 r6:84e0f700 r5:85594800 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe4dfb0 to 0xdfe4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84cfa500 INFO: task kworker/1:98:4563 is blocked on a mutex likely owned by task kworker/0:60:4511. task:kworker/0:60 state:R running task stack:0 pid:4511 tgid:4511 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3f164>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7288) r10:8280c9b4 r9:84c3c800 r8:80200c04 r7:dfdddd54 r6:ffffffff r5:84c3c800 r4:00000000 [<81a3f124>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfdddd20 to 0xdfdddd68) dd20: dfa15000 eb559000 00000001 80239bb8 7f00d000 00000001 82ac8f44 82ac8320 dd40: 7f00d000 eb559000 8280c9b4 dfdddd9c dfdddda0 dfdddd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e0424>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82ac8f64 [<804e01a0>] (__purge_vmap_area_lazy) from [<804e07dc>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfddddc0 r5:dfddde08 r4:dfddddc0 [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cae6c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:84c3c800 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dfc85000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:8553e78c r4:84dcbe80 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:8553e78c r4:84dcbe80 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c3c800 r8:84dcbeac r7:82804d40 r6:dddced40 r5:dddced60 r4:84dcbe80 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84dcbe80 r8:8027ade4 r7:dfa49e60 r6:84dcee80 r5:84c3c800 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfdddfb0 to 0xdfdddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84cae040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 32 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT Hardware name: ARM-Versatile Express Call trace: [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c arch/arm/kernel/traps.c:257) r7:00000000 r6:000f0013 r5:600f0093 r4:82260d4c [<80201b08>] (show_stack) from [<8021fc6c>] (__dump_stack lib/dump_stack.c:94 [inline]) [<80201b08>] (show_stack) from [<8021fc6c>] (dump_stack_lvl+0x70/0x7c lib/dump_stack.c:120) [<8021fbfc>] (dump_stack_lvl) from [<8021fc90>] (dump_stack+0x18/0x1c lib/dump_stack.c:129) r5:00000001 r4:00000001 [<8021fc78>] (dump_stack) from [<81a279b0>] (nmi_cpu_backtrace+0x160/0x17c lib/nmi_backtrace.c:113) [<81a27850>] (nmi_cpu_backtrace) from [<81a27afc>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8 lib/nmi_backtrace.c:62) r7:00000001 r6:8280c690 r5:8281ac94 r4:ffffffff [<81a279cc>] (nmi_trigger_cpumask_backtrace) from [<802304fc>] (arch_trigger_cpumask_backtrace+0x18/0x1c arch/arm/kernel/smp.c:852) r9:82abd56c r8:82804d40 r7:0000a444 r6:00007b8e r5:8281b248 r4:85c1720c [<802304e4>] (arch_trigger_cpumask_backtrace) from [<8037d958>] (trigger_all_cpu_backtrace include/linux/nmi.h:160 [inline]) [<802304e4>] (arch_trigger_cpumask_backtrace) from [<8037d958>] (check_hung_uninterruptible_tasks kernel/hung_task.c:328 [inline]) [<802304e4>] (arch_trigger_cpumask_backtrace) from [<8037d958>] (watchdog+0x4d4/0x81c kernel/hung_task.c:491) [<8037d484>] (watchdog) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:00000000 r8:8037d484 r7:830cf780 r6:830cf780 r5:83391800 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf8e1fb0 to 0xdf8e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:833ddc00 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 2844 Comm: pr/ttyAMA-1 Not tainted syzkaller #0 PREEMPT Hardware name: ARM-Versatile Express PC is at __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:152 [inline] PC is at _raw_spin_unlock_irqrestore+0x28/0x54 kernel/locking/spinlock.c:194 LR is at spin_unlock_irqrestore include/linux/spinlock.h:406 [inline] LR is at __uart_port_unlock_irqrestore include/linux/serial_core.h:616 [inline] LR is at pl011_console_device_unlock+0x20/0x24 drivers/tty/serial/amba-pl011.c:2603 pc : [<81a47d64>] lr : [<80a7a000>] psr: 60000013 sp : eb83deb0 ip : eb83dec0 fp : eb83debc r10: 82959154 r9 : 00000000 r8 : 00000000 r7 : 00000117 r6 : 829590b8 r5 : 00000000 r4 : 00000001 r3 : 000009d4 r2 : 00000000 r1 : 60000013 r0 : 83b83040 Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user Control: 30c5387d Table: 848dee40 DAC: fffffffd Call trace: [<81a47d3c>] (_raw_spin_unlock_irqrestore) from [<80a7a000>] (spin_unlock_irqrestore include/linux/spinlock.h:406 [inline]) [<81a47d3c>] (_raw_spin_unlock_irqrestore) from [<80a7a000>] (__uart_port_unlock_irqrestore include/linux/serial_core.h:616 [inline]) [<81a47d3c>] (_raw_spin_unlock_irqrestore) from [<80a7a000>] (pl011_console_device_unlock+0x20/0x24 drivers/tty/serial/amba-pl011.c:2603) [<80a79fe0>] (pl011_console_device_unlock) from [<802e456c>] (nbcon_emit_one+0x88/0x100 kernel/printk/nbcon.c:1142) [<802e44e4>] (nbcon_emit_one) from [<802e478c>] (nbcon_kthread_func+0x1a8/0x2a4 kernel/printk/nbcon.c:1229) r6:8280c690 r5:84b3a400 r4:829590b8 [<802e45e4>] (nbcon_kthread_func) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:829590b8 r8:802e45e4 r7:84717800 r6:84717800 r5:84b3a400 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb83dfb0 to 0xeb83dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:833e3440