INFO: task kworker/0:2:40 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:2 state:D stack:0 pid:40 tgid:40 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81ae65ac>] (__schedule) from [<81ae79c0>] (__schedule_loop kernel/sched/core.c:6990 [inline]) [<81ae65ac>] (__schedule) from [<81ae79c0>] (schedule+0x2c/0x134 kernel/sched/core.c:7005) r10:df905da4 r9:00000002 r8:60030013 r7:df905dac r6:82917cc4 r5:831d8c00 r4:831d8c00 [<81ae7994>] (schedule) from [<81ae7b4c>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7062) r5:831d8c00 r4:82917cc0 [<81ae7b34>] (schedule_preempt_disabled) from [<81aeaa94>] (__mutex_lock_common kernel/locking/mutex.c:692 [inline]) [<81ae7b34>] (schedule_preempt_disabled) from [<81aeaa94>] (__mutex_lock.constprop.0+0x480/0x9cc kernel/locking/mutex.c:776) [<81aea614>] (__mutex_lock.constprop.0) from [<81aeb0b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1065) r10:8280c82c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df905e28 r4:00000000 [<81aeb0a0>] (__mutex_lock_slowpath) from [<81aeb0f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:290) [<81aeb0b8>] (mutex_lock) from [<804fce70>] (_vm_unmap_aliases+0x5c/0x238 mm/vmalloc.c:2957) [<804fce14>] (_vm_unmap_aliases) from [<80500c68>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fce14>] (_vm_unmap_aliases) from [<80500c68>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302b005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85fc2580 r4:00000000 [<80500afc>] (vfree) from [<8056ebb0>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:831d8c00 r8:00800000 r7:00000000 r6:8302b000 r5:00001000 r4:7f0c7000 [<8056eb80>] (execmem_free) from [<803ced8c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:dfc5f000 [<803ced7c>] (bpf_jit_free_exec) from [<803cf16c>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803ced7c>] (bpf_jit_free_exec) from [<803cf16c>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf108>] (bpf_jit_free) from [<803d00a0>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2941) r5:85e71b94 r4:85e71b94 [<803cff58>] (bpf_prog_free_deferred) from [<8027662c>] (process_one_work+0x1b8/0x58c kernel/workqueue.c:3275) r7:dddd0d80 r6:8302b000 r5:85e71b94 r4:8332ac00 [<80276474>] (process_one_work) from [<802773f0>] (process_scheduled_works kernel/workqueue.c:3358 [inline]) [<80276474>] (process_one_work) from [<802773f0>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3439) r10:dddd0d80 r9:8332ac2c r8:831d8c00 r7:82804d80 r6:dddd0da0 r5:dddd0d80 r4:8332ac00 [<80277284>] (worker_thread) from [<802813b4>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:df83de88 r8:8332ab80 r7:8332ac00 r6:80277284 r5:831d8c00 r4:8332f4c0 [<80281298>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf905fb0 to 0xdf905ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281298 r4:8332f4c0 INFO: task kworker/0:2:40 is blocked on a mutex likely owned by task kworker/1:206:6528. task:kworker/1:206 state:R running task stack:0 pid:6528 tgid:6528 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81ae65ac>] (__schedule) from [<81ae7df8>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7235) r10:8280c880 r9:8610e000 r8:80200c04 r7:ea8e5d7c r6:ffffffff r5:8610e000 r4:00000000 [<81ae7db8>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea8e5d48 to 0xea8e5d90) 5d40: c533c000 ee129000 00000000 80238790 82ad3620 82ad4264 5d60: 7f113000 ee129000 00000000 00000001 8280c880 ea8e5dbc ee129000 ea8e5d98 5d80: 8022f700 802387a8 80000013 ffffffff r5:80000013 r4:802387a8 [<8022f6a0>] (flush_tlb_kernel_range) from [<804fcc20>] (__purge_vmap_area_lazy+0x298/0x48c mm/vmalloc.c:2382) [<804fc988>] (__purge_vmap_area_lazy) from [<804fcffc>] (_vm_unmap_aliases+0x1e8/0x238 mm/vmalloc.c:2996) r10:00000000 r9:ea8e5de0 r8:00000000 r7:ffffffff r6:00000008 r5:ea8e5e28 r4:ea8e5de0 [<804fce14>] (_vm_unmap_aliases) from [<80500c68>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fce14>] (_vm_unmap_aliases) from [<80500c68>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302ae05 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f15080 r4:00000000 [<80500afc>] (vfree) from [<8056ebb0>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:8610e000 r8:01800000 r7:00000000 r6:8302ae00 r5:00001000 r4:7f03b000 [<8056eb80>] (execmem_free) from [<803ced8c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:df963000 [<803ced7c>] (bpf_jit_free_exec) from [<803cf16c>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803ced7c>] (bpf_jit_free_exec) from [<803cf16c>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf108>] (bpf_jit_free) from [<803d00a0>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2941) r5:84ddeb94 r4:84ddeb94 [<803cff58>] (bpf_prog_free_deferred) from [<8027662c>] (process_one_work+0x1b8/0x58c kernel/workqueue.c:3275) r7:ddde4d80 r6:8302ae00 r5:84ddeb94 r4:860f9e00 [<80276474>] (process_one_work) from [<802773f0>] (process_scheduled_works kernel/workqueue.c:3358 [inline]) [<80276474>] (process_one_work) from [<802773f0>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3439) r10:00000000 r9:860f9e2c r8:8610e000 r7:82804d80 r6:ddde4da0 r5:ddde4d80 r4:860f9e00 [<80277284>] (worker_thread) from [<802813b4>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:dfca5e88 r8:8606a680 r7:860f9e00 r6:80277284 r5:8610e000 r4:860fdd80 [<80281298>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea8e5fb0 to 0xea8e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281298 r4:860fdd80 INFO: task kworker/0:3:3043 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:3 state:D stack:0 pid:3043 tgid:3043 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81ae65ac>] (__schedule) from [<81ae79c0>] (__schedule_loop kernel/sched/core.c:6990 [inline]) [<81ae65ac>] (__schedule) from [<81ae79c0>] (schedule+0x2c/0x134 kernel/sched/core.c:7005) r10:ec0cdda4 r9:00000002 r8:600b0013 r7:ec0cddac r6:82917cc4 r5:85864800 r4:85864800 [<81ae7994>] (schedule) from [<81ae7b4c>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7062) r5:85864800 r4:82917cc0 [<81ae7b34>] (schedule_preempt_disabled) from [<81aeaa94>] (__mutex_lock_common kernel/locking/mutex.c:692 [inline]) [<81ae7b34>] (schedule_preempt_disabled) from [<81aeaa94>] (__mutex_lock.constprop.0+0x480/0x9cc kernel/locking/mutex.c:776) [<81aea614>] (__mutex_lock.constprop.0) from [<81aeb0b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1065) r10:8280c82c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec0cde28 r4:00000000 [<81aeb0a0>] (__mutex_lock_slowpath) from [<81aeb0f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:290) [<81aeb0b8>] (mutex_lock) from [<804fce70>] (_vm_unmap_aliases+0x5c/0x238 mm/vmalloc.c:2957) [<804fce14>] (_vm_unmap_aliases) from [<80500c68>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fce14>] (_vm_unmap_aliases) from [<80500c68>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302b005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85306680 r4:00000000 [<80500afc>] (vfree) from [<8056ebb0>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:85864800 r8:00800000 r7:00000000 r6:8302b000 r5:00001000 r4:7f083000 [<8056eb80>] (execmem_free) from [<803ced8c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:dfc3d000 [<803ced7c>] (bpf_jit_free_exec) from [<803cf16c>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803ced7c>] (bpf_jit_free_exec) from [<803cf16c>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf108>] (bpf_jit_free) from [<803d00a0>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2941) r5:8502ab94 r4:8502ab94 [<803cff58>] (bpf_prog_free_deferred) from [<8027662c>] (process_one_work+0x1b8/0x58c kernel/workqueue.c:3275) r7:dddd0d80 r6:8302b000 r5:8502ab94 r4:84c91d80 [<80276474>] (process_one_work) from [<802773f0>] (process_scheduled_works kernel/workqueue.c:3358 [inline]) [<80276474>] (process_one_work) from [<802773f0>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3439) r10:dddd0d80 r9:84c91dac r8:85864800 r7:82804d80 r6:dddd0da0 r5:dddd0d80 r4:84c91d80 [<80277284>] (worker_thread) from [<802813b4>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:df905e88 r8:85afe600 r7:84c91d80 r6:80277284 r5:85864800 r4:85b1b080 [<80281298>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec0cdfb0 to 0xec0cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281298 r4:85b1b080 INFO: task kworker/0:3:3043 is blocked on a mutex likely owned by task kworker/1:206:6528. task:kworker/1:206 state:R running task stack:0 pid:6528 tgid:6528 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81ae65ac>] (__schedule) from [<81ae7df8>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7235) r10:8280c880 r9:8610e000 r8:80200c04 r7:ea8e5d7c r6:ffffffff r5:8610e000 r4:00000000 [<81ae7db8>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea8e5d48 to 0xea8e5d90) 5d40: c55a0000 ee129000 00000000 80238790 82ad3620 82ad4264 5d60: 7f113000 ee129000 00000000 00000001 8280c880 ea8e5dbc ee129000 ea8e5d98 5d80: 8022f700 802387a8 80000013 ffffffff r5:80000013 r4:802387a8 [<8022f6a0>] (flush_tlb_kernel_range) from [<804fcc20>] (__purge_vmap_area_lazy+0x298/0x48c mm/vmalloc.c:2382) [<804fc988>] (__purge_vmap_area_lazy) from [<804fcffc>] (_vm_unmap_aliases+0x1e8/0x238 mm/vmalloc.c:2996) r10:00000000 r9:ea8e5de0 r8:00000000 r7:ffffffff r6:00000008 r5:ea8e5e28 r4:ea8e5de0 [<804fce14>] (_vm_unmap_aliases) from [<80500c68>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fce14>] (_vm_unmap_aliases) from [<80500c68>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302ae05 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f15080 r4:00000000 [<80500afc>] (vfree) from [<8056ebb0>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:8610e000 r8:01800000 r7:00000000 r6:8302ae00 r5:00001000 r4:7f03b000 [<8056eb80>] (execmem_free) from [<803ced8c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:df963000 [<803ced7c>] (bpf_jit_free_exec) from [<803cf16c>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803ced7c>] (bpf_jit_free_exec) from [<803cf16c>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf108>] (bpf_jit_free) from [<803d00a0>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2941) r5:84ddeb94 r4:84ddeb94 [<803cff58>] (bpf_prog_free_deferred) from [<8027662c>] (process_one_work+0x1b8/0x58c kernel/workqueue.c:3275) r7:ddde4d80 r6:8302ae00 r5:84ddeb94 r4:860f9e00 [<80276474>] (process_one_work) from [<802773f0>] (process_scheduled_works kernel/workqueue.c:3358 [inline]) [<80276474>] (process_one_work) from [<802773f0>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3439) r10:00000000 r9:860f9e2c r8:8610e000 r7:82804d80 r6:ddde4da0 r5:ddde4d80 r4:860f9e00 [<80277284>] (worker_thread) from [<802813b4>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:dfca5e88 r8:8606a680 r7:860f9e00 r6:80277284 r5:8610e000 r4:860fdd80 [<80281298>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea8e5fb0 to 0xea8e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281298 r4:860fdd80 INFO: task kworker/1:36:5398 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:36 state:D stack:0 pid:5398 tgid:5398 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81ae65ac>] (__schedule) from [<81ae79c0>] (__schedule_loop kernel/sched/core.c:6990 [inline]) [<81ae65ac>] (__schedule) from [<81ae79c0>] (schedule+0x2c/0x134 kernel/sched/core.c:7005) r10:dfae9da4 r9:00000002 r8:60000113 r7:dfae9dac r6:82917cc4 r5:85872400 r4:85872400 [<81ae7994>] (schedule) from [<81ae7b4c>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7062) r5:85872400 r4:82917cc0 [<81ae7b34>] (schedule_preempt_disabled) from [<81aeaa94>] (__mutex_lock_common kernel/locking/mutex.c:692 [inline]) [<81ae7b34>] (schedule_preempt_disabled) from [<81aeaa94>] (__mutex_lock.constprop.0+0x480/0x9cc kernel/locking/mutex.c:776) [<81aea614>] (__mutex_lock.constprop.0) from [<81aeb0b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1065) r10:8280c82c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfae9e28 r4:00000000 [<81aeb0a0>] (__mutex_lock_slowpath) from [<81aeb0f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:290) [<81aeb0b8>] (mutex_lock) from [<804fce70>] (_vm_unmap_aliases+0x5c/0x238 mm/vmalloc.c:2957) [<804fce14>] (_vm_unmap_aliases) from [<80500c68>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fce14>] (_vm_unmap_aliases) from [<80500c68>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302ae05 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85fecc00 r4:00000000 [<80500afc>] (vfree) from [<8056ebb0>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:85872400 r8:01800000 r7:00000000 r6:8302ae00 r5:00001000 r4:7f081000 [<8056eb80>] (execmem_free) from [<803ced8c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:dfc25000 [<803ced7c>] (bpf_jit_free_exec) from [<803cf16c>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803ced7c>] (bpf_jit_free_exec) from [<803cf16c>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf108>] (bpf_jit_free) from [<803d00a0>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2941) r5:8502db94 r4:8502db94 [<803cff58>] (bpf_prog_free_deferred) from [<8027662c>] (process_one_work+0x1b8/0x58c kernel/workqueue.c:3275) r7:ddde4d80 r6:8302ae00 r5:8502db94 r4:860ee600 [<80276474>] (process_one_work) from [<802773f0>] (process_scheduled_works kernel/workqueue.c:3358 [inline]) [<80276474>] (process_one_work) from [<802773f0>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3439) r10:ddde4d80 r9:860ee62c r8:85872400 r7:82804d80 r6:ddde4da0 r5:ddde4d80 r4:860ee600 [<80277284>] (worker_thread) from [<802813b4>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:dfacde88 r8:860ee580 r7:860ee600 r6:80277284 r5:85872400 r4:852eaa00 [<80281298>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfae9fb0 to 0xdfae9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281298 r4:852eaa00 INFO: task kworker/1:36:5398 is blocked on a mutex likely owned by task kworker/1:206:6528. task:kworker/1:206 state:R running task stack:0 pid:6528 tgid:6528 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81ae65ac>] (__schedule) from [<81ae7df8>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7235) r10:8280c880 r9:8610e000 r8:80200c04 r7:ea8e5d7c r6:ffffffff r5:8610e000 r4:00000000 [<81ae7db8>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea8e5d48 to 0xea8e5d90) 5d40: c5797000 ee129000 00000000 80238790 82ad3620 82ad4264 5d60: 7f113000 ee129000 00000000 00000001 8280c880 ea8e5dbc ee129000 ea8e5d98 5d80: 8022f700 802387a8 80000013 ffffffff r5:80000013 r4:802387a8 [<8022f6a0>] (flush_tlb_kernel_range) from [<804fcc20>] (__purge_vmap_area_lazy+0x298/0x48c mm/vmalloc.c:2382) [<804fc988>] (__purge_vmap_area_lazy) from [<804fcffc>] (_vm_unmap_aliases+0x1e8/0x238 mm/vmalloc.c:2996) r10:00000000 r9:ea8e5de0 r8:00000000 r7:ffffffff r6:00000008 r5:ea8e5e28 r4:ea8e5de0 [<804fce14>] (_vm_unmap_aliases) from [<80500c68>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fce14>] (_vm_unmap_aliases) from [<80500c68>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302ae05 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f15080 r4:00000000 [<80500afc>] (vfree) from [<8056ebb0>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:8610e000 r8:01800000 r7:00000000 r6:8302ae00 r5:00001000 r4:7f03b000 [<8056eb80>] (execmem_free) from [<803ced8c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:df963000 [<803ced7c>] (bpf_jit_free_exec) from [<803cf16c>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803ced7c>] (bpf_jit_free_exec) from [<803cf16c>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf108>] (bpf_jit_free) from [<803d00a0>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2941) r5:84ddeb94 r4:84ddeb94 [<803cff58>] (bpf_prog_free_deferred) from [<8027662c>] (process_one_work+0x1b8/0x58c kernel/workqueue.c:3275) r7:ddde4d80 r6:8302ae00 r5:84ddeb94 r4:860f9e00 [<80276474>] (process_one_work) from [<802773f0>] (process_scheduled_works kernel/workqueue.c:3358 [inline]) [<80276474>] (process_one_work) from [<802773f0>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3439) r10:00000000 r9:860f9e2c r8:8610e000 r7:82804d80 r6:ddde4da0 r5:ddde4d80 r4:860f9e00 [<80277284>] (worker_thread) from [<802813b4>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:dfca5e88 r8:8606a680 r7:860f9e00 r6:80277284 r5:8610e000 r4:860fdd80 [<80281298>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea8e5fb0 to 0xea8e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281298 r4:860fdd80 INFO: task kworker/1:39:5409 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:39 state:D stack:0 pid:5409 tgid:5409 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81ae65ac>] (__schedule) from [<81ae79c0>] (__schedule_loop kernel/sched/core.c:6990 [inline]) [<81ae65ac>] (__schedule) from [<81ae79c0>] (schedule+0x2c/0x134 kernel/sched/core.c:7005) r10:dfa21da4 r9:00000002 r8:60000113 r7:dfa21dac r6:82917cc4 r5:85865400 r4:85865400 [<81ae7994>] (schedule) from [<81ae7b4c>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7062) r5:85865400 r4:82917cc0 [<81ae7b34>] (schedule_preempt_disabled) from [<81aeaa94>] (__mutex_lock_common kernel/locking/mutex.c:692 [inline]) [<81ae7b34>] (schedule_preempt_disabled) from [<81aeaa94>] (__mutex_lock.constprop.0+0x480/0x9cc kernel/locking/mutex.c:776) [<81aea614>] (__mutex_lock.constprop.0) from [<81aeb0b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1065) r10:8280c82c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa21e28 r4:00000000 [<81aeb0a0>] (__mutex_lock_slowpath) from [<81aeb0f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:290) [<81aeb0b8>] (mutex_lock) from [<804fce70>] (_vm_unmap_aliases+0x5c/0x238 mm/vmalloc.c:2957) [<804fce14>] (_vm_unmap_aliases) from [<80500c68>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fce14>] (_vm_unmap_aliases) from [<80500c68>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302ae05 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bb0140 r4:00000000 [<80500afc>] (vfree) from [<8056ebb0>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:85865400 r8:01800000 r7:00000000 r6:8302ae00 r5:00001000 r4:7f0cb000 [<8056eb80>] (execmem_free) from [<803ced8c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:dfc93000 [<803ced7c>] (bpf_jit_free_exec) from [<803cf16c>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803ced7c>] (bpf_jit_free_exec) from [<803cf16c>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf108>] (bpf_jit_free) from [<803d00a0>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2941) r5:85b70b94 r4:85b70b94 [<803cff58>] (bpf_prog_free_deferred) from [<8027662c>] (process_one_work+0x1b8/0x58c kernel/workqueue.c:3275) r7:ddde4d80 r6:8302ae00 r5:85b70b94 r4:85d42200 [<80276474>] (process_one_work) from [<802773f0>] (process_scheduled_works kernel/workqueue.c:3358 [inline]) [<80276474>] (process_one_work) from [<802773f0>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3439) r10:ddde4d80 r9:85d4222c r8:85865400 r7:82804d80 r6:ddde4da0 r5:ddde4d80 r4:85d42200 [<80277284>] (worker_thread) from [<802813b4>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:dfacde88 r8:84da6d80 r7:85d42200 r6:80277284 r5:85865400 r4:84eb8bc0 [<80281298>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa21fb0 to 0xdfa21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281298 r4:84eb8bc0 INFO: task kworker/1:39:5409 is blocked on a mutex likely owned by task kworker/1:206:6528. task:kworker/1:206 state:R running task stack:0 pid:6528 tgid:6528 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81ae65ac>] (__schedule) from [<81ae7df8>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7235) r10:8280c880 r9:8610e000 r8:80200c04 r7:ea8e5d7c r6:ffffffff r5:8610e000 r4:00000000 [<81ae7db8>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea8e5d48 to 0xea8e5d90) 5d40: c59af000 ee129000 00000000 80238790 82ad3620 82ad4264 5d60: 7f113000 ee129000 00000000 00000001 8280c880 ea8e5dbc ee129000 ea8e5d98 5d80: 8022f700 802387a8 80000013 ffffffff r5:80000013 r4:802387a8 [<8022f6a0>] (flush_tlb_kernel_range) from [<804fcc20>] (__purge_vmap_area_lazy+0x298/0x48c mm/vmalloc.c:2382) [<804fc988>] (__purge_vmap_area_lazy) from [<804fcffc>] (_vm_unmap_aliases+0x1e8/0x238 mm/vmalloc.c:2996) r10:00000000 r9:ea8e5de0 r8:00000000 r7:ffffffff r6:00000008 r5:ea8e5e28 r4:ea8e5de0 [<804fce14>] (_vm_unmap_aliases) from [<80500c68>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fce14>] (_vm_unmap_aliases) from [<80500c68>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302ae05 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f15080 r4:00000000 [<80500afc>] (vfree) from [<8056ebb0>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:8610e000 r8:01800000 r7:00000000 r6:8302ae00 r5:00001000 r4:7f03b000 [<8056eb80>] (execmem_free) from [<803ced8c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:df963000 [<803ced7c>] (bpf_jit_free_exec) from [<803cf16c>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803ced7c>] (bpf_jit_free_exec) from [<803cf16c>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf108>] (bpf_jit_free) from [<803d00a0>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2941) r5:84ddeb94 r4:84ddeb94 [<803cff58>] (bpf_prog_free_deferred) from [<8027662c>] (process_one_work+0x1b8/0x58c kernel/workqueue.c:3275) r7:ddde4d80 r6:8302ae00 r5:84ddeb94 r4:860f9e00 [<80276474>] (process_one_work) from [<802773f0>] (process_scheduled_works kernel/workqueue.c:3358 [inline]) [<80276474>] (process_one_work) from [<802773f0>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3439) r10:00000000 r9:860f9e2c r8:8610e000 r7:82804d80 r6:ddde4da0 r5:ddde4d80 r4:860f9e00 [<80277284>] (worker_thread) from [<802813b4>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:dfca5e88 r8:8606a680 r7:860f9e00 r6:80277284 r5:8610e000 r4:860fdd80 [<80281298>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea8e5fb0 to 0xea8e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281298 r4:860fdd80 INFO: task kworker/1:124:5850 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:124 state:D stack:0 pid:5850 tgid:5850 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81ae65ac>] (__schedule) from [<81ae79c0>] (__schedule_loop kernel/sched/core.c:6990 [inline]) [<81ae65ac>] (__schedule) from [<81ae79c0>] (schedule+0x2c/0x134 kernel/sched/core.c:7005) r10:e03d1da4 r9:00000002 r8:60000113 r7:e03d1dac r6:82917cc4 r5:850e3c00 r4:850e3c00 [<81ae7994>] (schedule) from [<81ae7b4c>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7062) r5:850e3c00 r4:82917cc0 [<81ae7b34>] (schedule_preempt_disabled) from [<81aeaa94>] (__mutex_lock_common kernel/locking/mutex.c:692 [inline]) [<81ae7b34>] (schedule_preempt_disabled) from [<81aeaa94>] (__mutex_lock.constprop.0+0x480/0x9cc kernel/locking/mutex.c:776) [<81aea614>] (__mutex_lock.constprop.0) from [<81aeb0b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1065) r10:8280c82c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e03d1e28 r4:00000000 [<81aeb0a0>] (__mutex_lock_slowpath) from [<81aeb0f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:290) [<81aeb0b8>] (mutex_lock) from [<804fce70>] (_vm_unmap_aliases+0x5c/0x238 mm/vmalloc.c:2957) [<804fce14>] (_vm_unmap_aliases) from [<80500c68>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fce14>] (_vm_unmap_aliases) from [<80500c68>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302ae05 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c72240 r4:00000000 [<80500afc>] (vfree) from [<8056ebb0>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:850e3c00 r8:01800000 r7:00000000 r6:8302ae00 r5:00001000 r4:7f043000 [<8056eb80>] (execmem_free) from [<803ced8c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:df9ad000 [<803ced7c>] (bpf_jit_free_exec) from [<803cf16c>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803ced7c>] (bpf_jit_free_exec) from [<803cf16c>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf108>] (bpf_jit_free) from [<803d00a0>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2941) r5:84e6a394 r4:84e6a394 [<803cff58>] (bpf_prog_free_deferred) from [<8027662c>] (process_one_work+0x1b8/0x58c kernel/workqueue.c:3275) r7:ddde4d80 r6:8302ae00 r5:84e6a394 r4:860f4800 [<80276474>] (process_one_work) from [<802773f0>] (process_scheduled_works kernel/workqueue.c:3358 [inline]) [<80276474>] (process_one_work) from [<802773f0>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3439) r10:00000000 r9:860f482c r8:850e3c00 r7:82804d80 r6:ddde4da0 r5:ddde4d80 r4:860f4800 [<80277284>] (worker_thread) from [<802813b4>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:e03fde88 r8:860f4500 r7:860f4800 r6:80277284 r5:850e3c00 r4:85d93640 [<80281298>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe03d1fb0 to 0xe03d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281298 r4:85d93640 INFO: task kworker/1:124:5850 is blocked on a mutex likely owned by task kworker/1:206:6528. task:kworker/1:206 state:R running task stack:0 pid:6528 tgid:6528 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81ae65ac>] (__schedule) from [<81ae7df8>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7235) r10:8280c880 r9:8610e000 r8:80200c04 r7:ea8e5d7c r6:ffffffff r5:8610e000 r4:00000000 [<81ae7db8>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea8e5d48 to 0xea8e5d90) 5d40: c59af000 ee129000 00000000 80238790 82ad3620 82ad4264 5d60: 7f113000 ee129000 00000000 00000001 8280c880 ea8e5dbc ee129000 ea8e5d98 5d80: 8022f700 802387a8 80000013 ffffffff r5:80000013 r4:802387a8 [<8022f6a0>] (flush_tlb_kernel_range) from [<804fcc20>] (__purge_vmap_area_lazy+0x298/0x48c mm/vmalloc.c:2382) [<804fc988>] (__purge_vmap_area_lazy) from [<804fcffc>] (_vm_unmap_aliases+0x1e8/0x238 mm/vmalloc.c:2996) r10:00000000 r9:ea8e5de0 r8:00000000 r7:ffffffff r6:00000008 r5:ea8e5e28 r4:ea8e5de0 [<804fce14>] (_vm_unmap_aliases) from [<80500c68>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fce14>] (_vm_unmap_aliases) from [<80500c68>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302ae05 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f15080 r4:00000000 [<80500afc>] (vfree) from [<8056ebb0>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:8610e000 r8:01800000 r7:00000000 r6:8302ae00 r5:00001000 r4:7f03b000 [<8056eb80>] (execmem_free) from [<803ced8c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:df963000 [<803ced7c>] (bpf_jit_free_exec) from [<803cf16c>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803ced7c>] (bpf_jit_free_exec) from [<803cf16c>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf108>] (bpf_jit_free) from [<803d00a0>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2941) r5:84ddeb94 r4:84ddeb94 [<803cff58>] (bpf_prog_free_deferred) from [<8027662c>] (process_one_work+0x1b8/0x58c kernel/workqueue.c:3275) r7:ddde4d80 r6:8302ae00 r5:84ddeb94 r4:860f9e00 [<80276474>] (process_one_work) from [<802773f0>] (process_scheduled_works kernel/workqueue.c:3358 [inline]) [<80276474>] (process_one_work) from [<802773f0>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3439) r10:00000000 r9:860f9e2c r8:8610e000 r7:82804d80 r6:ddde4da0 r5:ddde4d80 r4:860f9e00 [<80277284>] (worker_thread) from [<802813b4>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:dfca5e88 r8:8606a680 r7:860f9e00 r6:80277284 r5:8610e000 r4:860fdd80 [<80281298>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea8e5fb0 to 0xea8e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281298 r4:860fdd80 INFO: task kworker/1:132:5878 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:132 state:D stack:0 pid:5878 tgid:5878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81ae65ac>] (__schedule) from [<81ae79c0>] (__schedule_loop kernel/sched/core.c:6990 [inline]) [<81ae65ac>] (__schedule) from [<81ae79c0>] (schedule+0x2c/0x134 kernel/sched/core.c:7005) r10:e0469da4 r9:00000002 r8:60000113 r7:e0469dac r6:82917cc4 r5:8603c800 r4:8603c800 [<81ae7994>] (schedule) from [<81ae7b4c>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7062) r5:8603c800 r4:82917cc0 [<81ae7b34>] (schedule_preempt_disabled) from [<81aeaa94>] (__mutex_lock_common kernel/locking/mutex.c:692 [inline]) [<81ae7b34>] (schedule_preempt_disabled) from [<81aeaa94>] (__mutex_lock.constprop.0+0x480/0x9cc kernel/locking/mutex.c:776) [<81aea614>] (__mutex_lock.constprop.0) from [<81aeb0b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1065) r10:8280c82c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0469e28 r4:00000000 [<81aeb0a0>] (__mutex_lock_slowpath) from [<81aeb0f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:290) [<81aeb0b8>] (mutex_lock) from [<804fce70>] (_vm_unmap_aliases+0x5c/0x238 mm/vmalloc.c:2957) [<804fce14>] (_vm_unmap_aliases) from [<80500c68>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fce14>] (_vm_unmap_aliases) from [<80500c68>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302ae05 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d93800 r4:00000000 [<80500afc>] (vfree) from [<8056ebb0>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:8603c800 r8:01800000 r7:00000000 r6:8302ae00 r5:00001000 r4:7f075000 [<8056eb80>] (execmem_free) from [<803ced8c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:dfa29000 [<803ced7c>] (bpf_jit_free_exec) from [<803cf16c>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803ced7c>] (bpf_jit_free_exec) from [<803cf16c>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf108>] (bpf_jit_free) from [<803d00a0>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2941) r5:8502cb94 r4:8502cb94 [<803cff58>] (bpf_prog_free_deferred) from [<8027662c>] (process_one_work+0x1b8/0x58c kernel/workqueue.c:3275) r7:ddde4d80 r6:8302ae00 r5:8502cb94 r4:850c4b00 [<80276474>] (process_one_work) from [<802773f0>] (process_scheduled_works kernel/workqueue.c:3358 [inline]) [<80276474>] (process_one_work) from [<802773f0>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3439) r10:00000000 r9:850c4b2c r8:8603c800 r7:82804d80 r6:ddde4da0 r5:ddde4d80 r4:850c4b00 [<80277284>] (worker_thread) from [<802813b4>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:e0399e88 r8:850c4a80 r7:850c4b00 r6:80277284 r5:8603c800 r4:860ef880 [<80281298>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0469fb0 to 0xe0469ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281298 r4:860ef880 INFO: task kworker/1:132:5878 is blocked on a mutex likely owned by task kworker/1:206:6528. task:kworker/1:206 state:R running task stack:0 pid:6528 tgid:6528 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81ae65ac>] (__schedule) from [<81ae7df8>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7235) r10:8280c880 r9:8610e000 r8:80200c04 r7:ea8e5d7c r6:ffffffff r5:8610e000 r4:00000000 [<81ae7db8>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea8e5d48 to 0xea8e5d90) 5d40: c5bb1000 ee129000 00000000 80238790 82ad3620 82ad4264 5d60: 7f113000 ee129000 00000000 00000001 8280c880 ea8e5dbc ee129000 ea8e5d98 5d80: 8022f700 802387a8 80000013 ffffffff r5:80000013 r4:802387a8 [<8022f6a0>] (flush_tlb_kernel_range) from [<804fcc20>] (__purge_vmap_area_lazy+0x298/0x48c mm/vmalloc.c:2382) [<804fc988>] (__purge_vmap_area_lazy) from [<804fcffc>] (_vm_unmap_aliases+0x1e8/0x238 mm/vmalloc.c:2996) r10:00000000 r9:ea8e5de0 r8:00000000 r7:ffffffff r6:00000008 r5:ea8e5e28 r4:ea8e5de0 [<804fce14>] (_vm_unmap_aliases) from [<80500c68>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fce14>] (_vm_unmap_aliases) from [<80500c68>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302ae05 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f15080 r4:00000000 [<80500afc>] (vfree) from [<8056ebb0>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:8610e000 r8:01800000 r7:00000000 r6:8302ae00 r5:00001000 r4:7f03b000 [<8056eb80>] (execmem_free) from [<803ced8c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:df963000 [<803ced7c>] (bpf_jit_free_exec) from [<803cf16c>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803ced7c>] (bpf_jit_free_exec) from [<803cf16c>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf108>] (bpf_jit_free) from [<803d00a0>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2941) r5:84ddeb94 r4:84ddeb94 [<803cff58>] (bpf_prog_free_deferred) from [<8027662c>] (process_one_work+0x1b8/0x58c kernel/workqueue.c:3275) r7:ddde4d80 r6:8302ae00 r5:84ddeb94 r4:860f9e00 [<80276474>] (process_one_work) from [<802773f0>] (process_scheduled_works kernel/workqueue.c:3358 [inline]) [<80276474>] (process_one_work) from [<802773f0>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3439) r10:00000000 r9:860f9e2c r8:8610e000 r7:82804d80 r6:ddde4da0 r5:ddde4d80 r4:860f9e00 [<80277284>] (worker_thread) from [<802813b4>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:dfca5e88 r8:8606a680 r7:860f9e00 r6:80277284 r5:8610e000 r4:860fdd80 [<80281298>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea8e5fb0 to 0xea8e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281298 r4:860fdd80 INFO: task kworker/1:133:5883 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:133 state:D stack:0 pid:5883 tgid:5883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81ae65ac>] (__schedule) from [<81ae79c0>] (__schedule_loop kernel/sched/core.c:6990 [inline]) [<81ae65ac>] (__schedule) from [<81ae79c0>] (schedule+0x2c/0x134 kernel/sched/core.c:7005) r10:e046dda4 r9:00000002 r8:600f0113 r7:e046ddac r6:82917cc4 r5:8603b000 r4:8603b000 [<81ae7994>] (schedule) from [<81ae7b4c>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7062) r5:8603b000 r4:82917cc0 [<81ae7b34>] (schedule_preempt_disabled) from [<81aeaa94>] (__mutex_lock_common kernel/locking/mutex.c:692 [inline]) [<81ae7b34>] (schedule_preempt_disabled) from [<81aeaa94>] (__mutex_lock.constprop.0+0x480/0x9cc kernel/locking/mutex.c:776) [<81aea614>] (__mutex_lock.constprop.0) from [<81aeb0b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1065) r10:8280c82c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e046de28 r4:00000000 [<81aeb0a0>] (__mutex_lock_slowpath) from [<81aeb0f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:290) [<81aeb0b8>] (mutex_lock) from [<804fce70>] (_vm_unmap_aliases+0x5c/0x238 mm/vmalloc.c:2957) [<804fce14>] (_vm_unmap_aliases) from [<80500c68>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fce14>] (_vm_unmap_aliases) from [<80500c68>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302ae05 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:860fbe80 r4:00000000 [<80500afc>] (vfree) from [<8056ebb0>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:8603b000 r8:01800000 r7:00000000 r6:8302ae00 r5:00001000 r4:7f0c9000 [<8056eb80>] (execmem_free) from [<803ced8c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:dfc7f000 [<803ced7c>] (bpf_jit_free_exec) from [<803cf16c>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803ced7c>] (bpf_jit_free_exec) from [<803cf16c>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf108>] (bpf_jit_free) from [<803d00a0>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2941) r5:84e6b394 r4:84e6b394 [<803cff58>] (bpf_prog_free_deferred) from [<8027662c>] (process_one_work+0x1b8/0x58c kernel/workqueue.c:3275) r7:ddde4d80 r6:8302ae00 r5:84e6b394 r4:850c4900 [<80276474>] (process_one_work) from [<802773f0>] (process_scheduled_works kernel/workqueue.c:3358 [inline]) [<80276474>] (process_one_work) from [<802773f0>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3439) r10:00000000 r9:850c492c r8:8603b000 r7:82804d80 r6:ddde4da0 r5:ddde4d80 r4:850c4900 [<80277284>] (worker_thread) from [<802813b4>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:e03f5e88 r8:850c4880 r7:850c4900 r6:80277284 r5:8603b000 r4:852fc840 [<80281298>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe046dfb0 to 0xe046dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281298 r4:852fc840 INFO: task kworker/1:133:5883 is blocked on a mutex likely owned by task kworker/1:206:6528. task:kworker/1:206 state:R running task stack:0 pid:6528 tgid:6528 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81ae65ac>] (__schedule) from [<81ae7df8>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7235) r10:8280c880 r9:8610e000 r8:80200c04 r7:ea8e5d7c r6:ffffffff r5:8610e000 r4:00000000 [<81ae7db8>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea8e5d48 to 0xea8e5d90) 5d40: c5de2000 ee129000 00000000 80238790 82ad3620 82ad4264 5d60: 7f113000 ee129000 00000000 00000001 8280c880 ea8e5dbc ee129000 ea8e5d98 5d80: 8022f700 802387a8 80000013 ffffffff r5:80000013 r4:802387a8 [<8022f6a0>] (flush_tlb_kernel_range) from [<804fcc20>] (__purge_vmap_area_lazy+0x298/0x48c mm/vmalloc.c:2382) [<804fc988>] (__purge_vmap_area_lazy) from [<804fcffc>] (_vm_unmap_aliases+0x1e8/0x238 mm/vmalloc.c:2996) r10:00000000 r9:ea8e5de0 r8:00000000 r7:ffffffff r6:00000008 r5:ea8e5e28 r4:ea8e5de0 [<804fce14>] (_vm_unmap_aliases) from [<80500c68>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fce14>] (_vm_unmap_aliases) from [<80500c68>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302ae05 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f15080 r4:00000000 [<80500afc>] (vfree) from [<8056ebb0>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:8610e000 r8:01800000 r7:00000000 r6:8302ae00 r5:00001000 r4:7f03b000 [<8056eb80>] (execmem_free) from [<803ced8c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:df963000 [<803ced7c>] (bpf_jit_free_exec) from [<803cf16c>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803ced7c>] (bpf_jit_free_exec) from [<803cf16c>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf108>] (bpf_jit_free) from [<803d00a0>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2941) r5:84ddeb94 r4:84ddeb94 [<803cff58>] (bpf_prog_free_deferred) from [<8027662c>] (process_one_work+0x1b8/0x58c kernel/workqueue.c:3275) r7:ddde4d80 r6:8302ae00 r5:84ddeb94 r4:860f9e00 [<80276474>] (process_one_work) from [<802773f0>] (process_scheduled_works kernel/workqueue.c:3358 [inline]) [<80276474>] (process_one_work) from [<802773f0>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3439) r10:00000000 r9:860f9e2c r8:8610e000 r7:82804d80 r6:ddde4da0 r5:ddde4d80 r4:860f9e00 [<80277284>] (worker_thread) from [<802813b4>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:dfca5e88 r8:8606a680 r7:860f9e00 r6:80277284 r5:8610e000 r4:860fdd80 [<80281298>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea8e5fb0 to 0xea8e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281298 r4:860fdd80 INFO: task kworker/1:209:6539 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:209 state:D stack:0 pid:6539 tgid:6539 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81ae65ac>] (__schedule) from [<81ae79c0>] (__schedule_loop kernel/sched/core.c:6990 [inline]) [<81ae65ac>] (__schedule) from [<81ae79c0>] (schedule+0x2c/0x134 kernel/sched/core.c:7005) r10:ea911da4 r9:00000002 r8:60000013 r7:ea911dac r6:82917cc4 r5:8610a400 r4:8610a400 [<81ae7994>] (schedule) from [<81ae7b4c>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7062) r5:8610a400 r4:82917cc0 [<81ae7b34>] (schedule_preempt_disabled) from [<81aeaa94>] (__mutex_lock_common kernel/locking/mutex.c:692 [inline]) [<81ae7b34>] (schedule_preempt_disabled) from [<81aeaa94>] (__mutex_lock.constprop.0+0x480/0x9cc kernel/locking/mutex.c:776) [<81aea614>] (__mutex_lock.constprop.0) from [<81aeb0b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1065) r10:8280c82c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea911e28 r4:00000000 [<81aeb0a0>] (__mutex_lock_slowpath) from [<81aeb0f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:290) [<81aeb0b8>] (mutex_lock) from [<804fce70>] (_vm_unmap_aliases+0x5c/0x238 mm/vmalloc.c:2957) [<804fce14>] (_vm_unmap_aliases) from [<80500c68>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fce14>] (_vm_unmap_aliases) from [<80500c68>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302ae05 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:860f2e40 r4:00000000 [<80500afc>] (vfree) from [<8056ebb0>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:8610a400 r8:01800000 r7:00000000 r6:8302ae00 r5:00001000 r4:7f06b000 [<8056eb80>] (execmem_free) from [<803ced8c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:df9ed000 [<803ced7c>] (bpf_jit_free_exec) from [<803cf16c>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803ced7c>] (bpf_jit_free_exec) from [<803cf16c>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf108>] (bpf_jit_free) from [<803d00a0>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2941) r5:85b76b94 r4:85b76b94 [<803cff58>] (bpf_prog_free_deferred) from [<8027662c>] (process_one_work+0x1b8/0x58c kernel/workqueue.c:3275) r7:ddde4d80 r6:8302ae00 r5:85b76b94 r4:860f9900 [<80276474>] (process_one_work) from [<802773f0>] (process_scheduled_works kernel/workqueue.c:3358 [inline]) [<80276474>] (process_one_work) from [<802773f0>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3439) r10:00000000 r9:860f992c r8:8610a400 r7:82804d80 r6:ddde4da0 r5:ddde4d80 r4:860f9900 [<80277284>] (worker_thread) from [<802813b4>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:ea90de88 r8:85304780 r7:860f9900 r6:80277284 r5:8610a400 r4:860fa180 [<80281298>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea911fb0 to 0xea911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281298 r4:860fa180 INFO: task kworker/1:209:6539 is blocked on a mutex likely owned by task kworker/1:206:6528. task:kworker/1:206 state:R running task stack:0 pid:6528 tgid:6528 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81ae65ac>] (__schedule) from [<81ae7df8>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7235) r10:8280c880 r9:8610e000 r8:80200c04 r7:ea8e5d7c r6:ffffffff r5:8610e000 r4:00000000 [<81ae7db8>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea8e5d48 to 0xea8e5d90) 5d40: c5f3f000 ee129000 00000000 80238790 82ad3620 82ad4264 5d60: 7f113000 ee129000 00000000 00000001 8280c880 ea8e5dbc ee129000 ea8e5d98 5d80: 8022f700 802387a8 80000013 ffffffff r5:80000013 r4:802387a8 [<8022f6a0>] (flush_tlb_kernel_range) from [<804fcc20>] (__purge_vmap_area_lazy+0x298/0x48c mm/vmalloc.c:2382) [<804fc988>] (__purge_vmap_area_lazy) from [<804fcffc>] (_vm_unmap_aliases+0x1e8/0x238 mm/vmalloc.c:2996) r10:00000000 r9:ea8e5de0 r8:00000000 r7:ffffffff r6:00000008 r5:ea8e5e28 r4:ea8e5de0 [<804fce14>] (_vm_unmap_aliases) from [<80500c68>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fce14>] (_vm_unmap_aliases) from [<80500c68>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302ae05 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f15080 r4:00000000 [<80500afc>] (vfree) from [<8056ebb0>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:8610e000 r8:01800000 r7:00000000 r6:8302ae00 r5:00001000 r4:7f03b000 [<8056eb80>] (execmem_free) from [<803ced8c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:df963000 [<803ced7c>] (bpf_jit_free_exec) from [<803cf16c>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803ced7c>] (bpf_jit_free_exec) from [<803cf16c>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf108>] (bpf_jit_free) from [<803d00a0>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2941) r5:84ddeb94 r4:84ddeb94 [<803cff58>] (bpf_prog_free_deferred) from [<8027662c>] (process_one_work+0x1b8/0x58c kernel/workqueue.c:3275) r7:ddde4d80 r6:8302ae00 r5:84ddeb94 r4:860f9e00 [<80276474>] (process_one_work) from [<802773f0>] (process_scheduled_works kernel/workqueue.c:3358 [inline]) [<80276474>] (process_one_work) from [<802773f0>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3439) r10:00000000 r9:860f9e2c r8:8610e000 r7:82804d80 r6:ddde4da0 r5:ddde4d80 r4:860f9e00 [<80277284>] (worker_thread) from [<802813b4>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:dfca5e88 r8:8606a680 r7:860f9e00 r6:80277284 r5:8610e000 r4:860fdd80 [<80281298>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea8e5fb0 to 0xea8e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281298 r4:860fdd80 INFO: task kworker/1:213:6576 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:213 state:D stack:0 pid:6576 tgid:6576 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81ae65ac>] (__schedule) from [<81ae79c0>] (__schedule_loop kernel/sched/core.c:6990 [inline]) [<81ae65ac>] (__schedule) from [<81ae79c0>] (schedule+0x2c/0x134 kernel/sched/core.c:7005) r10:ea8f5da4 r9:00000002 r8:60000113 r7:ea8f5dac r6:82917cc4 r5:85388000 r4:85388000 [<81ae7994>] (schedule) from [<81ae7b4c>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7062) r5:85388000 r4:82917cc0 [<81ae7b34>] (schedule_preempt_disabled) from [<81aeaa94>] (__mutex_lock_common kernel/locking/mutex.c:692 [inline]) [<81ae7b34>] (schedule_preempt_disabled) from [<81aeaa94>] (__mutex_lock.constprop.0+0x480/0x9cc kernel/locking/mutex.c:776) [<81aea614>] (__mutex_lock.constprop.0) from [<81aeb0b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1065) r10:8280c82c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8f5e28 r4:00000000 [<81aeb0a0>] (__mutex_lock_slowpath) from [<81aeb0f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:290) [<81aeb0b8>] (mutex_lock) from [<804fce70>] (_vm_unmap_aliases+0x5c/0x238 mm/vmalloc.c:2957) [<804fce14>] (_vm_unmap_aliases) from [<80500c68>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fce14>] (_vm_unmap_aliases) from [<80500c68>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302ae05 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:83308040 r4:00000000 [<80500afc>] (vfree) from [<8056ebb0>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:85388000 r8:01800000 r7:00000000 r6:8302ae00 r5:00001000 r4:7f07d000 [<8056eb80>] (execmem_free) from [<803ced8c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:dfbf1000 [<803ced7c>] (bpf_jit_free_exec) from [<803cf16c>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803ced7c>] (bpf_jit_free_exec) from [<803cf16c>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf108>] (bpf_jit_free) from [<803d00a0>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2941) r5:8502bb94 r4:8502bb94 [<803cff58>] (bpf_prog_free_deferred) from [<8027662c>] (process_one_work+0x1b8/0x58c kernel/workqueue.c:3275) r7:ddde4d80 r6:8302ae00 r5:8502bb94 r4:85303e00 [<80276474>] (process_one_work) from [<802773f0>] (process_scheduled_works kernel/workqueue.c:3358 [inline]) [<80276474>] (process_one_work) from [<802773f0>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3439) r10:00000000 r9:85303e2c r8:85388000 r7:82804d80 r6:ddde4da0 r5:ddde4d80 r4:85303e00 [<80277284>] (worker_thread) from [<802813b4>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:ea919e88 r8:860f9980 r7:85303e00 r6:80277284 r5:85388000 r4:85305700 [<80281298>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea8f5fb0 to 0xea8f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281298 r4:85305700 INFO: task kworker/1:213:6576 is blocked on a mutex likely owned by task kworker/1:206:6528. task:kworker/1:206 state:R running task stack:0 pid:6528 tgid:6528 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81ae65ac>] (__schedule) from [<81ae7df8>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7235) r10:8280c880 r9:8610e000 r8:80200c04 r7:ea8e5d7c r6:ffffffff r5:8610e000 r4:00000000 [<81ae7db8>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea8e5d48 to 0xea8e5d90) 5d40: c5f3f000 ee129000 00000000 80238790 82ad3620 82ad4264 5d60: 7f113000 ee129000 00000000 00000001 8280c880 ea8e5dbc ee129000 ea8e5d98 5d80: 8022f700 802387a8 80000013 ffffffff r5:80000013 r4:802387a8 [<8022f6a0>] (flush_tlb_kernel_range) from [<804fcc20>] (__purge_vmap_area_lazy+0x298/0x48c mm/vmalloc.c:2382) [<804fc988>] (__purge_vmap_area_lazy) from [<804fcffc>] (_vm_unmap_aliases+0x1e8/0x238 mm/vmalloc.c:2996) r10:00000000 r9:ea8e5de0 r8:00000000 r7:ffffffff r6:00000008 r5:ea8e5e28 r4:ea8e5de0 [<804fce14>] (_vm_unmap_aliases) from [<80500c68>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fce14>] (_vm_unmap_aliases) from [<80500c68>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302ae05 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f15080 r4:00000000 [<80500afc>] (vfree) from [<8056ebb0>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:8610e000 r8:01800000 r7:00000000 r6:8302ae00 r5:00001000 r4:7f03b000 [<8056eb80>] (execmem_free) from [<803ced8c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:df963000 [<803ced7c>] (bpf_jit_free_exec) from [<803cf16c>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803ced7c>] (bpf_jit_free_exec) from [<803cf16c>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf108>] (bpf_jit_free) from [<803d00a0>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2941) r5:84ddeb94 r4:84ddeb94 [<803cff58>] (bpf_prog_free_deferred) from [<8027662c>] (process_one_work+0x1b8/0x58c kernel/workqueue.c:3275) r7:ddde4d80 r6:8302ae00 r5:84ddeb94 r4:860f9e00 [<80276474>] (process_one_work) from [<802773f0>] (process_scheduled_works kernel/workqueue.c:3358 [inline]) [<80276474>] (process_one_work) from [<802773f0>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3439) r10:00000000 r9:860f9e2c r8:8610e000 r7:82804d80 r6:ddde4da0 r5:ddde4d80 r4:860f9e00 [<80277284>] (worker_thread) from [<802813b4>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:dfca5e88 r8:8606a680 r7:860f9e00 r6:80277284 r5:8610e000 r4:860fdd80 [<80281298>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea8e5fb0 to 0xea8e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281298 r4:860fdd80 INFO: task kworker/0:244:6762 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:244 state:D stack:0 pid:6762 tgid:6762 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81ae65ac>] (__schedule) from [<81ae79c0>] (__schedule_loop kernel/sched/core.c:6990 [inline]) [<81ae65ac>] (__schedule) from [<81ae79c0>] (schedule+0x2c/0x134 kernel/sched/core.c:7005) r10:eaa35da4 r9:00000002 r8:60000113 r7:eaa35dac r6:82917cc4 r5:8612b000 r4:8612b000 [<81ae7994>] (schedule) from [<81ae7b4c>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7062) r5:8612b000 r4:82917cc0 [<81ae7b34>] (schedule_preempt_disabled) from [<81aeaa94>] (__mutex_lock_common kernel/locking/mutex.c:692 [inline]) [<81ae7b34>] (schedule_preempt_disabled) from [<81aeaa94>] (__mutex_lock.constprop.0+0x480/0x9cc kernel/locking/mutex.c:776) [<81aea614>] (__mutex_lock.constprop.0) from [<81aeb0b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1065) r10:8280c82c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa35e28 r4:00000000 [<81aeb0a0>] (__mutex_lock_slowpath) from [<81aeb0f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:290) [<81aeb0b8>] (mutex_lock) from [<804fce70>] (_vm_unmap_aliases+0x5c/0x238 mm/vmalloc.c:2957) [<804fce14>] (_vm_unmap_aliases) from [<80500c68>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fce14>] (_vm_unmap_aliases) from [<80500c68>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302b005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8512f600 r4:00000000 [<80500afc>] (vfree) from [<8056ebb0>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:8612b000 r8:00800000 r7:00000000 r6:8302b000 r5:00001000 r4:7f079000 [<8056eb80>] (execmem_free) from [<803ced8c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:dfa65000 [<803ced7c>] (bpf_jit_free_exec) from [<803cf16c>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803ced7c>] (bpf_jit_free_exec) from [<803cf16c>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf108>] (bpf_jit_free) from [<803d00a0>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2941) r5:8615b394 r4:8615b394 [<803cff58>] (bpf_prog_free_deferred) from [<8027662c>] (process_one_work+0x1b8/0x58c kernel/workqueue.c:3275) r7:dddd0d80 r6:8302b000 r5:8615b394 r4:8514d400 [<80276474>] (process_one_work) from [<802773f0>] (process_scheduled_works kernel/workqueue.c:3358 [inline]) [<80276474>] (process_one_work) from [<802773f0>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3439) r10:00000000 r9:8514d42c r8:8612b000 r7:82804d80 r6:dddd0da0 r5:dddd0d80 r4:8514d400 [<80277284>] (worker_thread) from [<802813b4>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:eaae1e88 r8:8514d380 r7:8514d400 r6:80277284 r5:8612b000 r4:84eb8d40 [<80281298>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa35fb0 to 0xeaa35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281298 r4:84eb8d40 INFO: task kworker/0:244:6762 is blocked on a mutex likely owned by task kworker/1:206:6528. task:kworker/1:206 state:R running task stack:0 pid:6528 tgid:6528 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81ae65ac>] (__schedule) from [<81ae7df8>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7235) r10:8280c880 r9:8610e000 r8:80200c04 r7:ea8e5d7c r6:ffffffff r5:8610e000 r4:00000000 [<81ae7db8>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea8e5d48 to 0xea8e5d90) 5d40: c633e000 ee129000 00000000 80238790 82ad3620 82ad4264 5d60: 7f113000 ee129000 00000000 00000001 8280c880 ea8e5dbc ee129000 ea8e5d98 5d80: 8022f700 802387a8 80000013 ffffffff r5:80000013 r4:802387a8 [<8022f6a0>] (flush_tlb_kernel_range) from [<804fcc20>] (__purge_vmap_area_lazy+0x298/0x48c mm/vmalloc.c:2382) [<804fc988>] (__purge_vmap_area_lazy) from [<804fcffc>] (_vm_unmap_aliases+0x1e8/0x238 mm/vmalloc.c:2996) r10:00000000 r9:ea8e5de0 r8:00000000 r7:ffffffff r6:00000008 r5:ea8e5e28 r4:ea8e5de0 [<804fce14>] (_vm_unmap_aliases) from [<80500c68>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fce14>] (_vm_unmap_aliases) from [<80500c68>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302ae05 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f15080 r4:00000000 [<80500afc>] (vfree) from [<8056ebb0>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:8610e000 r8:01800000 r7:00000000 r6:8302ae00 r5:00001000 r4:7f03b000 [<8056eb80>] (execmem_free) from [<803ced8c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:df963000 [<803ced7c>] (bpf_jit_free_exec) from [<803cf16c>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803ced7c>] (bpf_jit_free_exec) from [<803cf16c>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf108>] (bpf_jit_free) from [<803d00a0>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2941) r5:84ddeb94 r4:84ddeb94 [<803cff58>] (bpf_prog_free_deferred) from [<8027662c>] (process_one_work+0x1b8/0x58c kernel/workqueue.c:3275) r7:ddde4d80 r6:8302ae00 r5:84ddeb94 r4:860f9e00 [<80276474>] (process_one_work) from [<802773f0>] (process_scheduled_works kernel/workqueue.c:3358 [inline]) [<80276474>] (process_one_work) from [<802773f0>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3439) r10:00000000 r9:860f9e2c r8:8610e000 r7:82804d80 r6:ddde4da0 r5:ddde4d80 r4:860f9e00 [<80277284>] (worker_thread) from [<802813b4>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:dfca5e88 r8:8606a680 r7:860f9e00 r6:80277284 r5:8610e000 r4:860fdd80 [<80281298>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea8e5fb0 to 0xea8e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281298 r4:860fdd80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:249:6782 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:249 state:D stack:0 pid:6782 tgid:6782 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81ae65ac>] (__schedule) from [<81ae79c0>] (__schedule_loop kernel/sched/core.c:6990 [inline]) [<81ae65ac>] (__schedule) from [<81ae79c0>] (schedule+0x2c/0x134 kernel/sched/core.c:7005) r10:eab49da4 r9:00000002 r8:60000113 r7:eab49dac r6:82917cc4 r5:861e0c00 r4:861e0c00 [<81ae7994>] (schedule) from [<81ae7b4c>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7062) r5:861e0c00 r4:82917cc0 [<81ae7b34>] (schedule_preempt_disabled) from [<81aeaa94>] (__mutex_lock_common kernel/locking/mutex.c:692 [inline]) [<81ae7b34>] (schedule_preempt_disabled) from [<81aeaa94>] (__mutex_lock.constprop.0+0x480/0x9cc kernel/locking/mutex.c:776) [<81aea614>] (__mutex_lock.constprop.0) from [<81aeb0b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1065) r10:8280c82c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab49e28 r4:00000000 [<81aeb0a0>] (__mutex_lock_slowpath) from [<81aeb0f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:290) [<81aeb0b8>] (mutex_lock) from [<804fce70>] (_vm_unmap_aliases+0x5c/0x238 mm/vmalloc.c:2957) [<804fce14>] (_vm_unmap_aliases) from [<80500c68>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fce14>] (_vm_unmap_aliases) from [<80500c68>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302b005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852ef1c0 r4:00000000 [<80500afc>] (vfree) from [<8056ebb0>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:861e0c00 r8:00800000 r7:00000000 r6:8302b000 r5:00001000 r4:7f085000 [<8056eb80>] (execmem_free) from [<803ced8c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:dfc4b000 [<803ced7c>] (bpf_jit_free_exec) from [<803cf16c>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803ced7c>] (bpf_jit_free_exec) from [<803cf16c>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf108>] (bpf_jit_free) from [<803d00a0>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2941) r5:8531cb94 r4:8531cb94 [<803cff58>] (bpf_prog_free_deferred) from [<8027662c>] (process_one_work+0x1b8/0x58c kernel/workqueue.c:3275) r7:dddd0d80 r6:8302b000 r5:8531cb94 r4:8514cf00 [<80276474>] (process_one_work) from [<802773f0>] (process_scheduled_works kernel/workqueue.c:3358 [inline]) [<80276474>] (process_one_work) from [<802773f0>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3439) r10:00000000 r9:8514cf2c r8:861e0c00 r7:82804d80 r6:dddd0da0 r5:dddd0d80 r4:8514cf00 [<80277284>] (worker_thread) from [<802813b4>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:eab41e88 r8:8514cb00 r7:8514cf00 r6:80277284 r5:861e0c00 r4:8514ba00 [<80281298>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab49fb0 to 0xeab49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281298 r4:8514ba00 INFO: task kworker/0:249:6782 is blocked on a mutex likely owned by task kworker/1:206:6528. task:kworker/1:206 state:R running task stack:0 pid:6528 tgid:6528 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81ae65ac>] (__schedule) from [<81ae7df8>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7235) r10:8280c880 r9:8610e000 r8:80200c04 r7:ea8e5d7c r6:ffffffff r5:8610e000 r4:00000000 [<81ae7db8>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea8e5d48 to 0xea8e5d90) 5d40: c66c6000 ee129000 00000000 80238790 82ad3620 82ad4264 5d60: 7f113000 ee129000 00000000 00000001 8280c880 ea8e5dbc ee129000 ea8e5d98 5d80: 8022f700 802387a8 80000013 ffffffff r5:80000013 r4:802387a8 [<8022f6a0>] (flush_tlb_kernel_range) from [<804fcc20>] (__purge_vmap_area_lazy+0x298/0x48c mm/vmalloc.c:2382) [<804fc988>] (__purge_vmap_area_lazy) from [<804fcffc>] (_vm_unmap_aliases+0x1e8/0x238 mm/vmalloc.c:2996) r10:00000000 r9:ea8e5de0 r8:00000000 r7:ffffffff r6:00000008 r5:ea8e5e28 r4:ea8e5de0 [<804fce14>] (_vm_unmap_aliases) from [<80500c68>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fce14>] (_vm_unmap_aliases) from [<80500c68>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302ae05 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f15080 r4:00000000 [<80500afc>] (vfree) from [<8056ebb0>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:8610e000 r8:01800000 r7:00000000 r6:8302ae00 r5:00001000 r4:7f03b000 [<8056eb80>] (execmem_free) from [<803ced8c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:df963000 [<803ced7c>] (bpf_jit_free_exec) from [<803cf16c>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803ced7c>] (bpf_jit_free_exec) from [<803cf16c>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf108>] (bpf_jit_free) from [<803d00a0>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2941) r5:84ddeb94 r4:84ddeb94 [<803cff58>] (bpf_prog_free_deferred) from [<8027662c>] (process_one_work+0x1b8/0x58c kernel/workqueue.c:3275) r7:ddde4d80 r6:8302ae00 r5:84ddeb94 r4:860f9e00 [<80276474>] (process_one_work) from [<802773f0>] (process_scheduled_works kernel/workqueue.c:3358 [inline]) [<80276474>] (process_one_work) from [<802773f0>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3439) r10:00000000 r9:860f9e2c r8:8610e000 r7:82804d80 r6:ddde4da0 r5:ddde4d80 r4:860f9e00 [<80277284>] (worker_thread) from [<802813b4>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:dfca5e88 r8:8606a680 r7:860f9e00 r6:80277284 r5:8610e000 r4:860fdd80 [<80281298>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea8e5fb0 to 0xea8e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281298 r4:860fdd80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:252:6794 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:252 state:D stack:0 pid:6794 tgid:6794 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81ae65ac>] (__schedule) from [<81ae79c0>] (__schedule_loop kernel/sched/core.c:6990 [inline]) [<81ae65ac>] (__schedule) from [<81ae79c0>] (schedule+0x2c/0x134 kernel/sched/core.c:7005) r10:eaaedda4 r9:00000002 r8:600f0113 r7:eaaeddac r6:82917cc4 r5:861e0000 r4:861e0000 [<81ae7994>] (schedule) from [<81ae7b4c>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7062) r5:861e0000 r4:82917cc0 [<81ae7b34>] (schedule_preempt_disabled) from [<81aeaa94>] (__mutex_lock_common kernel/locking/mutex.c:692 [inline]) [<81ae7b34>] (schedule_preempt_disabled) from [<81aeaa94>] (__mutex_lock.constprop.0+0x480/0x9cc kernel/locking/mutex.c:776) [<81aea614>] (__mutex_lock.constprop.0) from [<81aeb0b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1065) r10:8280c82c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaede28 r4:00000000 [<81aeb0a0>] (__mutex_lock_slowpath) from [<81aeb0f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:290) [<81aeb0b8>] (mutex_lock) from [<804fce70>] (_vm_unmap_aliases+0x5c/0x238 mm/vmalloc.c:2957) [<804fce14>] (_vm_unmap_aliases) from [<80500c68>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fce14>] (_vm_unmap_aliases) from [<80500c68>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302b005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85148b40 r4:00000000 [<80500afc>] (vfree) from [<8056ebb0>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:861e0000 r8:00800000 r7:00000000 r6:8302b000 r5:00001000 r4:7f069000 [<8056eb80>] (execmem_free) from [<803ced8c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:df9c5000 [<803ced7c>] (bpf_jit_free_exec) from [<803cf16c>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803ced7c>] (bpf_jit_free_exec) from [<803cf16c>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf108>] (bpf_jit_free) from [<803d00a0>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2941) r5:85fb8b94 r4:85fb8b94 [<803cff58>] (bpf_prog_free_deferred) from [<8027662c>] (process_one_work+0x1b8/0x58c kernel/workqueue.c:3275) r7:dddd0d80 r6:8302b000 r5:85fb8b94 r4:8514c800 [<80276474>] (process_one_work) from [<802773f0>] (process_scheduled_works kernel/workqueue.c:3358 [inline]) [<80276474>] (process_one_work) from [<802773f0>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3439) r10:dddd0d80 r9:8514c82c r8:861e0000 r7:82804d80 r6:dddd0da0 r5:dddd0d80 r4:8514c800 [<80277284>] (worker_thread) from [<802813b4>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:eab39e88 r8:8514cd80 r7:8514c800 r6:80277284 r5:861e0000 r4:8514b440 [<80281298>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaaedfb0 to 0xeaaedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281298 r4:8514b440 INFO: task kworker/0:252:6794 is blocked on a mutex likely owned by task kworker/1:206:6528. task:kworker/1:206 state:R running task stack:0 pid:6528 tgid:6528 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81ae65ac>] (__schedule) from [<81ae7df8>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7235) r10:8280c880 r9:8610e000 r8:80200c04 r7:ea8e5d7c r6:ffffffff r5:8610e000 r4:00000000 [<81ae7db8>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea8e5d48 to 0xea8e5d90) 5d40: c66c6000 ee129000 00000000 80238790 82ad3620 82ad4264 5d60: 7f113000 ee129000 00000000 00000001 8280c880 ea8e5dbc ee129000 ea8e5d98 5d80: 8022f700 802387a8 80000013 ffffffff r5:80000013 r4:802387a8 [<8022f6a0>] (flush_tlb_kernel_range) from [<804fcc20>] (__purge_vmap_area_lazy+0x298/0x48c mm/vmalloc.c:2382) [<804fc988>] (__purge_vmap_area_lazy) from [<804fcffc>] (_vm_unmap_aliases+0x1e8/0x238 mm/vmalloc.c:2996) r10:00000000 r9:ea8e5de0 r8:00000000 r7:ffffffff r6:00000008 r5:ea8e5e28 r4:ea8e5de0 [<804fce14>] (_vm_unmap_aliases) from [<80500c68>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fce14>] (_vm_unmap_aliases) from [<80500c68>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302ae05 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f15080 r4:00000000 [<80500afc>] (vfree) from [<8056ebb0>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:8610e000 r8:01800000 r7:00000000 r6:8302ae00 r5:00001000 r4:7f03b000 [<8056eb80>] (execmem_free) from [<803ced8c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:df963000 [<803ced7c>] (bpf_jit_free_exec) from [<803cf16c>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803ced7c>] (bpf_jit_free_exec) from [<803cf16c>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf108>] (bpf_jit_free) from [<803d00a0>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2941) r5:84ddeb94 r4:84ddeb94 [<803cff58>] (bpf_prog_free_deferred) from [<8027662c>] (process_one_work+0x1b8/0x58c kernel/workqueue.c:3275) r7:ddde4d80 r6:8302ae00 r5:84ddeb94 r4:860f9e00 [<80276474>] (process_one_work) from [<802773f0>] (process_scheduled_works kernel/workqueue.c:3358 [inline]) [<80276474>] (process_one_work) from [<802773f0>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3439) r10:00000000 r9:860f9e2c r8:8610e000 r7:82804d80 r6:ddde4da0 r5:ddde4d80 r4:860f9e00 [<80277284>] (worker_thread) from [<802813b4>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:dfca5e88 r8:8606a680 r7:860f9e00 r6:80277284 r5:8610e000 r4:860fdd80 [<80281298>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea8e5fb0 to 0xea8e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281298 r4:860fdd80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:256:6804 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:256 state:D stack:0 pid:6804 tgid:6804 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81ae65ac>] (__schedule) from [<81ae79c0>] (__schedule_loop kernel/sched/core.c:6990 [inline]) [<81ae65ac>] (__schedule) from [<81ae79c0>] (schedule+0x2c/0x134 kernel/sched/core.c:7005) r10:eab1dda4 r9:00000002 r8:60000113 r7:eab1ddac r6:82917cc4 r5:861de000 r4:861de000 [<81ae7994>] (schedule) from [<81ae7b4c>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7062) r5:861de000 r4:82917cc0 [<81ae7b34>] (schedule_preempt_disabled) from [<81aeaa94>] (__mutex_lock_common kernel/locking/mutex.c:692 [inline]) [<81ae7b34>] (schedule_preempt_disabled) from [<81aeaa94>] (__mutex_lock.constprop.0+0x480/0x9cc kernel/locking/mutex.c:776) [<81aea614>] (__mutex_lock.constprop.0) from [<81aeb0b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1065) r10:8280c82c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab1de28 r4:00000000 [<81aeb0a0>] (__mutex_lock_slowpath) from [<81aeb0f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:290) [<81aeb0b8>] (mutex_lock) from [<804fce70>] (_vm_unmap_aliases+0x5c/0x238 mm/vmalloc.c:2957) [<804fce14>] (_vm_unmap_aliases) from [<80500c68>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fce14>] (_vm_unmap_aliases) from [<80500c68>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302b005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8607a640 r4:00000000 [<80500afc>] (vfree) from [<8056ebb0>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:861de000 r8:00800000 r7:00000000 r6:8302b000 r5:00001000 r4:7f07b000 [<8056eb80>] (execmem_free) from [<803ced8c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:dfa7d000 [<803ced7c>] (bpf_jit_free_exec) from [<803cf16c>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803ced7c>] (bpf_jit_free_exec) from [<803cf16c>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf108>] (bpf_jit_free) from [<803d00a0>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2941) r5:85e3b394 r4:85e3b394 [<803cff58>] (bpf_prog_free_deferred) from [<8027662c>] (process_one_work+0x1b8/0x58c kernel/workqueue.c:3275) r7:dddd0d80 r6:8302b000 r5:85e3b394 r4:8514c380 [<80276474>] (process_one_work) from [<802773f0>] (process_scheduled_works kernel/workqueue.c:3358 [inline]) [<80276474>] (process_one_work) from [<802773f0>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3439) r10:00000000 r9:8514c3ac r8:861de000 r7:82804d80 r6:dddd0da0 r5:dddd0d80 r4:8514c380 [<80277284>] (worker_thread) from [<802813b4>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:eaaede88 r8:8514c400 r7:8514c380 r6:80277284 r5:861de000 r4:860f0180 [<80281298>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab1dfb0 to 0xeab1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281298 r4:860f0180 INFO: task kworker/0:256:6804 is blocked on a mutex likely owned by task kworker/1:206:6528. task:kworker/1:206 state:R running task stack:0 pid:6528 tgid:6528 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81ae65ac>] (__schedule) from [<81ae7df8>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7235) r10:8280c880 r9:8610e000 r8:80200c04 r7:ea8e5d7c r6:ffffffff r5:8610e000 r4:00000000 [<81ae7db8>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea8e5d48 to 0xea8e5d90) 5d40: c6c91000 ee129000 00000000 80238790 82ad3620 82ad4264 5d60: 7f113000 ee129000 00000000 00000001 8280c880 ea8e5dbc ee129000 ea8e5d98 5d80: 8022f700 802387a8 80000013 ffffffff r5:80000013 r4:802387a8 [<8022f6a0>] (flush_tlb_kernel_range) from [<804fcc20>] (__purge_vmap_area_lazy+0x298/0x48c mm/vmalloc.c:2382) [<804fc988>] (__purge_vmap_area_lazy) from [<804fcffc>] (_vm_unmap_aliases+0x1e8/0x238 mm/vmalloc.c:2996) r10:00000000 r9:ea8e5de0 r8:00000000 r7:ffffffff r6:00000008 r5:ea8e5e28 r4:ea8e5de0 [<804fce14>] (_vm_unmap_aliases) from [<80500c68>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fce14>] (_vm_unmap_aliases) from [<80500c68>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302ae05 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f15080 r4:00000000 [<80500afc>] (vfree) from [<8056ebb0>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:8610e000 r8:01800000 r7:00000000 r6:8302ae00 r5:00001000 r4:7f03b000 [<8056eb80>] (execmem_free) from [<803ced8c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:df963000 [<803ced7c>] (bpf_jit_free_exec) from [<803cf16c>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803ced7c>] (bpf_jit_free_exec) from [<803cf16c>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf108>] (bpf_jit_free) from [<803d00a0>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2941) r5:84ddeb94 r4:84ddeb94 [<803cff58>] (bpf_prog_free_deferred) from [<8027662c>] (process_one_work+0x1b8/0x58c kernel/workqueue.c:3275) r7:ddde4d80 r6:8302ae00 r5:84ddeb94 r4:860f9e00 [<80276474>] (process_one_work) from [<802773f0>] (process_scheduled_works kernel/workqueue.c:3358 [inline]) [<80276474>] (process_one_work) from [<802773f0>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3439) r10:00000000 r9:860f9e2c r8:8610e000 r7:82804d80 r6:ddde4da0 r5:ddde4d80 r4:860f9e00 [<80277284>] (worker_thread) from [<802813b4>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:dfca5e88 r8:8606a680 r7:860f9e00 r6:80277284 r5:8610e000 r4:860fdd80 [<80281298>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea8e5fb0 to 0xea8e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281298 r4:860fdd80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:265:6887 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:265 state:D stack:0 pid:6887 tgid:6887 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81ae65ac>] (__schedule) from [<81ae79c0>] (__schedule_loop kernel/sched/core.c:6990 [inline]) [<81ae65ac>] (__schedule) from [<81ae79c0>] (schedule+0x2c/0x134 kernel/sched/core.c:7005) r10:eab69da4 r9:00000002 r8:60000113 r7:eab69dac r6:82917cc4 r5:861d6c00 r4:861d6c00 [<81ae7994>] (schedule) from [<81ae7b4c>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7062) r5:861d6c00 r4:82917cc0 [<81ae7b34>] (schedule_preempt_disabled) from [<81aeaa94>] (__mutex_lock_common kernel/locking/mutex.c:692 [inline]) [<81ae7b34>] (schedule_preempt_disabled) from [<81aeaa94>] (__mutex_lock.constprop.0+0x480/0x9cc kernel/locking/mutex.c:776) [<81aea614>] (__mutex_lock.constprop.0) from [<81aeb0b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1065) r10:8280c82c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab69e28 r4:00000000 [<81aeb0a0>] (__mutex_lock_slowpath) from [<81aeb0f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:290) [<81aeb0b8>] (mutex_lock) from [<804fce70>] (_vm_unmap_aliases+0x5c/0x238 mm/vmalloc.c:2957) [<804fce14>] (_vm_unmap_aliases) from [<80500c68>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fce14>] (_vm_unmap_aliases) from [<80500c68>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302b005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8482d040 r4:00000000 [<80500afc>] (vfree) from [<8056ebb0>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:861d6c00 r8:00800000 r7:00000000 r6:8302b000 r5:00001000 r4:7f077000 [<8056eb80>] (execmem_free) from [<803ced8c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:dfa3f000 [<803ced7c>] (bpf_jit_free_exec) from [<803cf16c>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803ced7c>] (bpf_jit_free_exec) from [<803cf16c>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf108>] (bpf_jit_free) from [<803d00a0>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2941) r5:85f8b394 r4:85f8b394 [<803cff58>] (bpf_prog_free_deferred) from [<8027662c>] (process_one_work+0x1b8/0x58c kernel/workqueue.c:3275) r7:dddd0d80 r6:8302b000 r5:85f8b394 r4:84f16b80 [<80276474>] (process_one_work) from [<802773f0>] (process_scheduled_works kernel/workqueue.c:3358 [inline]) [<80276474>] (process_one_work) from [<802773f0>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3439) r10:dddd0d80 r9:84f16bac r8:861d6c00 r7:82804d80 r6:dddd0da0 r5:dddd0d80 r4:84f16b80 [<80277284>] (worker_thread) from [<802813b4>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:eab99e88 r8:84f22580 r7:84f16b80 r6:80277284 r5:861d6c00 r4:85c60ac0 [<80281298>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab69fb0 to 0xeab69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281298 r4:85c60ac0 INFO: task kworker/0:265:6887 is blocked on a mutex likely owned by task kworker/1:206:6528. task:kworker/1:206 state:R running task stack:0 pid:6528 tgid:6528 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81ae65ac>] (__schedule) from [<81ae7df8>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7235) r10:8280c880 r9:8610e000 r8:80200c04 r7:ea8e5d7c r6:ffffffff r5:8610e000 r4:00000000 [<81ae7db8>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea8e5d48 to 0xea8e5d90) 5d40: c6c91000 ee129000 00000000 80238790 82ad3620 82ad4264 5d60: 7f113000 ee129000 00000000 00000001 8280c880 ea8e5dbc ee129000 ea8e5d98 5d80: 8022f700 802387a8 80000013 ffffffff r5:80000013 r4:802387a8 [<8022f6a0>] (flush_tlb_kernel_range) from [<804fcc20>] (__purge_vmap_area_lazy+0x298/0x48c mm/vmalloc.c:2382) [<804fc988>] (__purge_vmap_area_lazy) from [<804fcffc>] (_vm_unmap_aliases+0x1e8/0x238 mm/vmalloc.c:2996) r10:00000000 r9:ea8e5de0 r8:00000000 r7:ffffffff r6:00000008 r5:ea8e5e28 r4:ea8e5de0 [<804fce14>] (_vm_unmap_aliases) from [<80500c68>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fce14>] (_vm_unmap_aliases) from [<80500c68>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302ae05 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f15080 r4:00000000 [<80500afc>] (vfree) from [<8056ebb0>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:8610e000 r8:01800000 r7:00000000 r6:8302ae00 r5:00001000 r4:7f03b000 [<8056eb80>] (execmem_free) from [<803ced8c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:df963000 [<803ced7c>] (bpf_jit_free_exec) from [<803cf16c>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803ced7c>] (bpf_jit_free_exec) from [<803cf16c>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf108>] (bpf_jit_free) from [<803d00a0>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2941) r5:84ddeb94 r4:84ddeb94 [<803cff58>] (bpf_prog_free_deferred) from [<8027662c>] (process_one_work+0x1b8/0x58c kernel/workqueue.c:3275) r7:ddde4d80 r6:8302ae00 r5:84ddeb94 r4:860f9e00 [<80276474>] (process_one_work) from [<802773f0>] (process_scheduled_works kernel/workqueue.c:3358 [inline]) [<80276474>] (process_one_work) from [<802773f0>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3439) r10:00000000 r9:860f9e2c r8:8610e000 r7:82804d80 r6:ddde4da0 r5:ddde4d80 r4:860f9e00 [<80277284>] (worker_thread) from [<802813b4>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:dfca5e88 r8:8606a680 r7:860f9e00 r6:80277284 r5:8610e000 r4:860fdd80 [<80281298>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea8e5fb0 to 0xea8e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281298 r4:860fdd80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:266:6888 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:266 state:D stack:0 pid:6888 tgid:6888 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81ae65ac>] (__schedule) from [<81ae79c0>] (__schedule_loop kernel/sched/core.c:6990 [inline]) [<81ae65ac>] (__schedule) from [<81ae79c0>] (schedule+0x2c/0x134 kernel/sched/core.c:7005) r10:eabc5da4 r9:00000002 r8:60000113 r7:eabc5dac r6:82917cc4 r5:861d8000 r4:861d8000 [<81ae7994>] (schedule) from [<81ae7b4c>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7062) r5:861d8000 r4:82917cc0 [<81ae7b34>] (schedule_preempt_disabled) from [<81aeaa94>] (__mutex_lock_common kernel/locking/mutex.c:692 [inline]) [<81ae7b34>] (schedule_preempt_disabled) from [<81aeaa94>] (__mutex_lock.constprop.0+0x480/0x9cc kernel/locking/mutex.c:776) [<81aea614>] (__mutex_lock.constprop.0) from [<81aeb0b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1065) r10:8280c82c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabc5e28 r4:00000000 [<81aeb0a0>] (__mutex_lock_slowpath) from [<81aeb0f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:290) [<81aeb0b8>] (mutex_lock) from [<804fce70>] (_vm_unmap_aliases+0x5c/0x238 mm/vmalloc.c:2957) [<804fce14>] (_vm_unmap_aliases) from [<80500c68>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fce14>] (_vm_unmap_aliases) from [<80500c68>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302b005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:860f8140 r4:00000000 [<80500afc>] (vfree) from [<8056ebb0>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:861d8000 r8:00800000 r7:00000000 r6:8302b000 r5:00001000 r4:7f07f000 [<8056eb80>] (execmem_free) from [<803ced8c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:dfc11000 [<803ced7c>] (bpf_jit_free_exec) from [<803cf16c>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803ced7c>] (bpf_jit_free_exec) from [<803cf16c>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf108>] (bpf_jit_free) from [<803d00a0>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2941) r5:839d2b94 r4:839d2b94 [<803cff58>] (bpf_prog_free_deferred) from [<8027662c>] (process_one_work+0x1b8/0x58c kernel/workqueue.c:3275) r7:dddd0d80 r6:8302b000 r5:839d2b94 r4:85c7a280 [<80276474>] (process_one_work) from [<802773f0>] (process_scheduled_works kernel/workqueue.c:3358 [inline]) [<80276474>] (process_one_work) from [<802773f0>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3439) r10:00000000 r9:85c7a2ac r8:861d8000 r7:82804d80 r6:dddd0da0 r5:dddd0d80 r4:85c7a280 [<80277284>] (worker_thread) from [<802813b4>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:eab69e88 r8:84829e80 r7:85c7a280 r6:80277284 r5:861d8000 r4:85bab240 [<80281298>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabc5fb0 to 0xeabc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281298 r4:85bab240 INFO: task kworker/0:266:6888 is blocked on a mutex likely owned by task kworker/1:206:6528. task:kworker/1:206 state:R running task stack:0 pid:6528 tgid:6528 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81ae65ac>] (__schedule) from [<81ae7df8>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7235) r10:8280c880 r9:8610e000 r8:80200c04 r7:ea8e5d7c r6:ffffffff r5:8610e000 r4:00000000 [<81ae7db8>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea8e5d48 to 0xea8e5d90) 5d40: c6c91000 ee129000 00000000 80238790 82ad3620 82ad4264 5d60: 7f113000 ee129000 00000000 00000001 8280c880 ea8e5dbc ee129000 ea8e5d98 5d80: 8022f700 802387a8 80000013 ffffffff r5:80000013 r4:802387a8 [<8022f6a0>] (flush_tlb_kernel_range) from [<804fcc20>] (__purge_vmap_area_lazy+0x298/0x48c mm/vmalloc.c:2382) [<804fc988>] (__purge_vmap_area_lazy) from [<804fcffc>] (_vm_unmap_aliases+0x1e8/0x238 mm/vmalloc.c:2996) r10:00000000 r9:ea8e5de0 r8:00000000 r7:ffffffff r6:00000008 r5:ea8e5e28 r4:ea8e5de0 [<804fce14>] (_vm_unmap_aliases) from [<80500c68>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fce14>] (_vm_unmap_aliases) from [<80500c68>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302ae05 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f15080 r4:00000000 [<80500afc>] (vfree) from [<8056ebb0>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:8610e000 r8:01800000 r7:00000000 r6:8302ae00 r5:00001000 r4:7f03b000 [<8056eb80>] (execmem_free) from [<803ced8c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:df963000 [<803ced7c>] (bpf_jit_free_exec) from [<803cf16c>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803ced7c>] (bpf_jit_free_exec) from [<803cf16c>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf108>] (bpf_jit_free) from [<803d00a0>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2941) r5:84ddeb94 r4:84ddeb94 [<803cff58>] (bpf_prog_free_deferred) from [<8027662c>] (process_one_work+0x1b8/0x58c kernel/workqueue.c:3275) r7:ddde4d80 r6:8302ae00 r5:84ddeb94 r4:860f9e00 [<80276474>] (process_one_work) from [<802773f0>] (process_scheduled_works kernel/workqueue.c:3358 [inline]) [<80276474>] (process_one_work) from [<802773f0>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3439) r10:00000000 r9:860f9e2c r8:8610e000 r7:82804d80 r6:ddde4da0 r5:ddde4d80 r4:860f9e00 [<80277284>] (worker_thread) from [<802813b4>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:dfca5e88 r8:8606a680 r7:860f9e00 r6:80277284 r5:8610e000 r4:860fdd80 [<80281298>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea8e5fb0 to 0xea8e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281298 r4:860fdd80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:269:8301 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:269 state:D stack:0 pid:8301 tgid:8301 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81ae65ac>] (__schedule) from [<81ae79c0>] (__schedule_loop kernel/sched/core.c:6990 [inline]) [<81ae65ac>] (__schedule) from [<81ae79c0>] (schedule+0x2c/0x134 kernel/sched/core.c:7005) r10:eabb1da4 r9:00000002 r8:600b0113 r7:eabb1dac r6:82917cc4 r5:86259800 r4:86259800 [<81ae7994>] (schedule) from [<81ae7b4c>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7062) r5:86259800 r4:82917cc0 [<81ae7b34>] (schedule_preempt_disabled) from [<81aeaa94>] (__mutex_lock_common kernel/locking/mutex.c:692 [inline]) [<81ae7b34>] (schedule_preempt_disabled) from [<81aeaa94>] (__mutex_lock.constprop.0+0x480/0x9cc kernel/locking/mutex.c:776) [<81aea614>] (__mutex_lock.constprop.0) from [<81aeb0b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1065) r10:8280c82c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabb1e28 r4:00000000 [<81aeb0a0>] (__mutex_lock_slowpath) from [<81aeb0f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:290) [<81aeb0b8>] (mutex_lock) from [<804fce70>] (_vm_unmap_aliases+0x5c/0x238 mm/vmalloc.c:2957) [<804fce14>] (_vm_unmap_aliases) from [<80500c68>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fce14>] (_vm_unmap_aliases) from [<80500c68>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302b005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850ab200 r4:00000000 [<80500afc>] (vfree) from [<8056ebb0>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:86259800 r8:00800000 r7:00000000 r6:8302b000 r5:00001000 r4:7f03d000 [<8056eb80>] (execmem_free) from [<803ced8c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:df97d000 [<803ced7c>] (bpf_jit_free_exec) from [<803cf16c>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803ced7c>] (bpf_jit_free_exec) from [<803cf16c>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf108>] (bpf_jit_free) from [<803d00a0>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2941) r5:85395b94 r4:85395b94 [<803cff58>] (bpf_prog_free_deferred) from [<8027662c>] (process_one_work+0x1b8/0x58c kernel/workqueue.c:3275) r7:dddd0d80 r6:8302b000 r5:85395b94 r4:85baff80 [<80276474>] (process_one_work) from [<802773f0>] (process_scheduled_works kernel/workqueue.c:3358 [inline]) [<80276474>] (process_one_work) from [<802773f0>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3439) r10:dddd0d80 r9:85baffac r8:86259800 r7:82804d80 r6:dddd0da0 r5:dddd0d80 r4:85baff80 [<80277284>] (worker_thread) from [<802813b4>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:eab99e88 r8:85ff6900 r7:85baff80 r6:80277284 r5:86259800 r4:8525ed80 [<80281298>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabb1fb0 to 0xeabb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281298 r4:8525ed80 INFO: task kworker/0:269:8301 is blocked on a mutex likely owned by task kworker/1:206:6528. task:kworker/1:206 state:R running task stack:0 pid:6528 tgid:6528 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81ae65ac>] (__schedule) from [<81ae7df8>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7235) r10:8280c880 r9:8610e000 r8:80200c04 r7:ea8e5d7c r6:ffffffff r5:8610e000 r4:00000000 [<81ae7db8>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea8e5d48 to 0xea8e5d90) 5d40: c71aa000 ee129000 00000000 80238790 82ad3620 82ad4264 5d60: 7f113000 ee129000 00000000 00000001 8280c880 ea8e5dbc ee129000 ea8e5d98 5d80: 8022f700 802387a8 80000013 ffffffff r5:80000013 r4:802387a8 [<8022f6a0>] (flush_tlb_kernel_range) from [<804fcc20>] (__purge_vmap_area_lazy+0x298/0x48c mm/vmalloc.c:2382) [<804fc988>] (__purge_vmap_area_lazy) from [<804fcffc>] (_vm_unmap_aliases+0x1e8/0x238 mm/vmalloc.c:2996) r10:00000000 r9:ea8e5de0 r8:00000000 r7:ffffffff r6:00000008 r5:ea8e5e28 r4:ea8e5de0 [<804fce14>] (_vm_unmap_aliases) from [<80500c68>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fce14>] (_vm_unmap_aliases) from [<80500c68>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302ae05 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f15080 r4:00000000 [<80500afc>] (vfree) from [<8056ebb0>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:8610e000 r8:01800000 r7:00000000 r6:8302ae00 r5:00001000 r4:7f03b000 [<8056eb80>] (execmem_free) from [<803ced8c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:df963000 [<803ced7c>] (bpf_jit_free_exec) from [<803cf16c>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803ced7c>] (bpf_jit_free_exec) from [<803cf16c>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf108>] (bpf_jit_free) from [<803d00a0>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2941) r5:84ddeb94 r4:84ddeb94 [<803cff58>] (bpf_prog_free_deferred) from [<8027662c>] (process_one_work+0x1b8/0x58c kernel/workqueue.c:3275) r7:ddde4d80 r6:8302ae00 r5:84ddeb94 r4:860f9e00 [<80276474>] (process_one_work) from [<802773f0>] (process_scheduled_works kernel/workqueue.c:3358 [inline]) [<80276474>] (process_one_work) from [<802773f0>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3439) r10:00000000 r9:860f9e2c r8:8610e000 r7:82804d80 r6:ddde4da0 r5:ddde4d80 r4:860f9e00 [<80277284>] (worker_thread) from [<802813b4>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:dfca5e88 r8:8606a680 r7:860f9e00 r6:80277284 r5:8610e000 r4:860fdd80 [<80281298>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea8e5fb0 to 0xea8e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281298 r4:860fdd80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 29 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT Hardware name: ARM-Versatile Express Call trace: [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c arch/arm/kernel/traps.c:257) r7:60070093 r6:60070093 r5:822a7c18 r4:00000000 [<80201af0>] (show_stack) from [<8021e448>] (__dump_stack lib/dump_stack.c:94 [inline]) [<80201af0>] (show_stack) from [<8021e448>] (dump_stack_lvl+0x5c/0x70 lib/dump_stack.c:120) [<8021e3ec>] (dump_stack_lvl) from [<8021e474>] (dump_stack+0x18/0x1c lib/dump_stack.c:129) r7:00000000 r6:00070013 r5:00000001 r4:00000001 [<8021e45c>] (dump_stack) from [<81acffdc>] (nmi_cpu_backtrace+0x150/0x170 lib/nmi_backtrace.c:113) [<81acfe8c>] (nmi_cpu_backtrace) from [<81ad012c>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8 lib/nmi_backtrace.c:62) r7:00000001 r6:8280c550 r5:8281afb8 r4:ffffffff [<81acfffc>] (nmi_trigger_cpumask_backtrace) from [<8022f124>] (arch_trigger_cpumask_backtrace+0x18/0x1c arch/arm/kernel/smp.c:852) r9:8281bca0 r8:8280c6d8 r7:82804d80 r6:00007752 r5:82ac7834 r4:00000048 [<8022f10c>] (arch_trigger_cpumask_backtrace) from [<81ad7c1c>] (trigger_all_cpu_backtrace include/linux/nmi.h:161 [inline]) [<8022f10c>] (arch_trigger_cpumask_backtrace) from [<81ad7c1c>] (__sys_info lib/sys_info.c:157 [inline]) [<8022f10c>] (arch_trigger_cpumask_backtrace) from [<81ad7c1c>] (sys_info+0x68/0xa8 lib/sys_info.c:165) [<81ad7bb4>] (sys_info) from [<80384eb4>] (check_hung_uninterruptible_tasks kernel/hung_task.c:346 [inline]) [<81ad7bb4>] (sys_info) from [<80384eb4>] (watchdog+0x598/0x8d4 kernel/hung_task.c:515) r5:82ac7834 r4:86c6b214 [<8038491c>] (watchdog) from [<802813b4>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:df819e60 r8:830efa80 r7:00000000 r6:8038491c r5:831e0000 r4:83871300 [<80281298>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf8d5fb0 to 0xdf8d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281298 r4:83871300 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 2808 Comm: pr/ttyAMA-1 Not tainted syzkaller #0 PREEMPT Hardware name: ARM-Versatile Express PC is at __srcu_read_lock_nmisafe+0x0/0x48 kernel/rcu/srcutree.c:848 LR is at srcu_read_lock_nmisafe include/linux/srcu.h:427 [inline] LR is at console_srcu_read_lock+0x14/0x1c kernel/printk/printk.c:291 pc : [<802fd858>] lr : [<802dfeb8>] psr: 60000113 sp : eb5a9f00 ip : eb5a9f10 fp : eb5a9f0c r10: 8295b7a4 r9 : 00000000 r8 : 00000000 r7 : 00000001 r6 : 82ac410c r5 : 8295b708 r4 : 85866000 r3 : 8281f940 r2 : 0000078c r1 : 00000000 r0 : 82827428 Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user Control: 30c5387d Table: 85040bc0 DAC: fffffffd Call trace: [<802dfea4>] (console_srcu_read_lock) from [<802e6a1c>] (nbcon_kthread_func+0x19c/0x2ec kernel/printk/nbcon.c:1266) [<802e6880>] (nbcon_kthread_func) from [<802813b4>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:ea685b48 r8:84c8f900 r7:8295b708 r6:802e6880 r5:85866000 r4:84c95400 [<80281298>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5a9fb0 to 0xeb5a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281298 r4:84c95400