INFO: task kworker/0:1:11 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1 state:D stack:0 pid:11 tgid:11 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3ed30>] (__schedule_loop kernel/sched/core.c:7043 [inline]) [<81a3dd9c>] (__schedule) from [<81a3ed30>] (schedule+0x2c/0x130 kernel/sched/core.c:7058) r10:df845d84 r9:00000002 r8:60000013 r7:82916594 r6:df845d8c r5:83210000 r4:83210000 [<81a3ed04>] (schedule) from [<81a3f118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7115) r5:83210000 r4:82916590 [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a41978>] (__mutex_lock.constprop.0) from [<81a42470>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df845e08 r4:00000000 [<81a4245c>] (__mutex_lock_slowpath) from [<81a424b0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a42474>] (mutex_lock) from [<804e0660>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f33e80 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:83210000 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:e02bb000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:8568578c r4:830b9580 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:8568578c r4:830b9580 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83210000 r8:830b95ac r7:82804d40 r6:dddced40 r5:dddced60 r4:830b9580 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:830b9580 r8:8027ade4 r7:df83de60 r6:830b9700 r5:83210000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf845fb0 to 0xdf845ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:830b6980 INFO: task kworker/0:1:11 is blocked on a mutex likely owned by task kworker/0:39:4180. task:kworker/0:39 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3f164>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7288) r10:8280c9b4 r9:856b0000 r8:80200c04 r7:dfebdd54 r6:ffffffff r5:856b0000 r4:00000000 [<81a3f124>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfebdd20 to 0xdfebdd68) dd20: 8181c000 ed7dd000 00000001 80239bb8 7f079000 00000001 82ac8f44 82ac8320 dd40: 7f079000 ed7dd000 8280c9b4 dfebdd9c dfebdda0 dfebdd70 80230af0 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e0424>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82ac8f64 [<804e01a0>] (__purge_vmap_area_lazy) from [<804e07dc>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfebddc0 r5:dfebde08 r4:dfebddc0 [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc15c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:df9cf000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:84eeb38c r4:84fd8500 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:84eeb38c r4:84fd8500 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856b0000 r8:84fd852c r7:82804d40 r6:dddced40 r5:dddced60 r4:84fd8500 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84fd8500 r8:8027ade4 r7:dfe51e60 r6:84da7700 r5:856b0000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfebdfb0 to 0xdfebdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84fd5e80 INFO: task kworker/1:0:23 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:0 state:D stack:0 pid:23 tgid:23 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3ed30>] (__schedule_loop kernel/sched/core.c:7043 [inline]) [<81a3dd9c>] (__schedule) from [<81a3ed30>] (schedule+0x2c/0x130 kernel/sched/core.c:7058) r10:df879d84 r9:00000002 r8:60000013 r7:82916594 r6:df879d8c r5:8321a400 r4:8321a400 [<81a3ed04>] (schedule) from [<81a3f118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7115) r5:8321a400 r4:82916590 [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a41978>] (__mutex_lock.constprop.0) from [<81a42470>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df879e08 r4:00000000 [<81a4245c>] (__mutex_lock_slowpath) from [<81a424b0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a42474>] (mutex_lock) from [<804e0660>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854de000 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018205 r8:8321a400 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dfadb000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:85622b8c r4:830cf080 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:ddde2d40 r6:83018200 r5:85622b8c r4:830cf080 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8321a400 r8:830cf0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:830cf080 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:830cf080 r8:8027ade4 r7:df819d50 r6:830cf100 r5:8321a400 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf879fb0 to 0xdf879ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:830cd100 INFO: task kworker/1:0:23 is blocked on a mutex likely owned by task kworker/0:39:4180. task:kworker/0:39 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3f164>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7288) r10:8280c9b4 r9:856b0000 r8:80200c04 r7:dfebdd54 r6:ffffffff r5:856b0000 r4:00000000 [<81a3f124>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfebdd20 to 0xdfebdd68) dd20: 81bbf000 ed7dd000 00000001 80239bb8 7f079000 00000001 82ac8f44 82ac8320 dd40: 7f079000 ed7dd000 8280c9b4 dfebdd9c dfebdda0 dfebdd70 80230af0 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e0424>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82ac8f64 [<804e01a0>] (__purge_vmap_area_lazy) from [<804e07dc>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfebddc0 r5:dfebde08 r4:dfebddc0 [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc15c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:df9cf000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:84eeb38c r4:84fd8500 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:84eeb38c r4:84fd8500 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856b0000 r8:84fd852c r7:82804d40 r6:dddced40 r5:dddced60 r4:84fd8500 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84fd8500 r8:8027ade4 r7:dfe51e60 r6:84da7700 r5:856b0000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfebdfb0 to 0xdfebdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84fd5e80 INFO: task kworker/1:2:97 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:2 state:D stack:0 pid:97 tgid:97 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3ed30>] (__schedule_loop kernel/sched/core.c:7043 [inline]) [<81a3dd9c>] (__schedule) from [<81a3ed30>] (schedule+0x2c/0x130 kernel/sched/core.c:7058) r10:df9b1d84 r9:00000002 r8:60000113 r7:82916594 r6:df9b1d8c r5:83a81800 r4:83a81800 [<81a3ed04>] (schedule) from [<81a3f118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7115) r5:83a81800 r4:82916590 [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a41978>] (__mutex_lock.constprop.0) from [<81a42470>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9b1e08 r4:00000000 [<81a4245c>] (__mutex_lock_slowpath) from [<81a424b0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a42474>] (mutex_lock) from [<804e0660>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85648480 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018205 r8:83a81800 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dfa7d000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:8568638c r4:832bf600 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:ddde2d40 r6:83018200 r5:8568638c r4:832bf600 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83a81800 r8:832bf62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:832bf600 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:832bf600 r8:8027ade4 r7:df879e60 r6:838fc900 r5:83a81800 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9b1fb0 to 0xdf9b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:832b0180 INFO: task kworker/1:2:97 is blocked on a mutex likely owned by task kworker/0:39:4180. task:kworker/0:39 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3f164>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7288) r10:8280c9b4 r9:856b0000 r8:80200c04 r7:dfebdd54 r6:ffffffff r5:856b0000 r4:00000000 [<81a3f124>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfebdd20 to 0xdfebdd68) dd20: 81bbf000 ed7dd000 00000001 80239bb8 7f079000 00000001 82ac8f44 82ac8320 dd40: 7f079000 ed7dd000 8280c9b4 dfebdd9c dfebdda0 dfebdd70 80230af0 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e0424>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82ac8f64 [<804e01a0>] (__purge_vmap_area_lazy) from [<804e07dc>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfebddc0 r5:dfebde08 r4:dfebddc0 [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc15c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:df9cf000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:84eeb38c r4:84fd8500 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:84eeb38c r4:84fd8500 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856b0000 r8:84fd852c r7:82804d40 r6:dddced40 r5:dddced60 r4:84fd8500 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84fd8500 r8:8027ade4 r7:dfe51e60 r6:84da7700 r5:856b0000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfebdfb0 to 0xdfebdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84fd5e80 INFO: task kworker/0:38:4163 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:38 state:D stack:0 pid:4163 tgid:4163 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3ed30>] (__schedule_loop kernel/sched/core.c:7043 [inline]) [<81a3dd9c>] (__schedule) from [<81a3ed30>] (schedule+0x2c/0x130 kernel/sched/core.c:7058) r10:dfe51d84 r9:00000002 r8:60000113 r7:82916594 r6:dfe51d8c r5:83aa8c00 r4:83aa8c00 [<81a3ed04>] (schedule) from [<81a3f118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7115) r5:83aa8c00 r4:82916590 [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a41978>] (__mutex_lock.constprop.0) from [<81a42470>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe51e08 r4:00000000 [<81a4245c>] (__mutex_lock_slowpath) from [<81a424b0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a42474>] (mutex_lock) from [<804e0660>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f32300 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:83aa8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c3000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dff01000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:855fff8c r4:84fd8080 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:855fff8c r4:84fd8080 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83aa8c00 r8:84fd80ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84fd8080 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84fd8080 r8:8027ade4 r7:dfdcde60 r6:84fd8100 r5:83aa8c00 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe51fb0 to 0xdfe51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84fd57c0 INFO: task kworker/0:38:4163 is blocked on a mutex likely owned by task kworker/0:39:4180. task:kworker/0:39 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3f164>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7288) r10:8280c9b4 r9:856b0000 r8:80200c04 r7:dfebdd54 r6:ffffffff r5:856b0000 r4:00000000 [<81a3f124>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfebdd20 to 0xdfebdd68) dd20: 81eb0000 ed7dd000 00000001 80239bb8 7f079000 00000001 82ac8f44 82ac8320 dd40: 7f079000 ed7dd000 8280c9b4 dfebdd9c dfebdda0 dfebdd70 80230af0 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e0424>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82ac8f64 [<804e01a0>] (__purge_vmap_area_lazy) from [<804e07dc>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfebddc0 r5:dfebde08 r4:dfebddc0 [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc15c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:df9cf000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:84eeb38c r4:84fd8500 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:84eeb38c r4:84fd8500 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856b0000 r8:84fd852c r7:82804d40 r6:dddced40 r5:dddced60 r4:84fd8500 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84fd8500 r8:8027ade4 r7:dfe51e60 r6:84da7700 r5:856b0000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfebdfb0 to 0xdfebdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84fd5e80 INFO: task kworker/1:47:4175 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:47 state:D stack:0 pid:4175 tgid:4175 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3ed30>] (__schedule_loop kernel/sched/core.c:7043 [inline]) [<81a3dd9c>] (__schedule) from [<81a3ed30>] (schedule+0x2c/0x130 kernel/sched/core.c:7058) r10:dfea9d84 r9:00000002 r8:60000113 r7:82916594 r6:dfea9d8c r5:84990c00 r4:84990c00 [<81a3ed04>] (schedule) from [<81a3f118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7115) r5:84990c00 r4:82916590 [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a41978>] (__mutex_lock.constprop.0) from [<81a42470>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfea9e08 r4:00000000 [<81a4245c>] (__mutex_lock_slowpath) from [<81a424b0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a42474>] (mutex_lock) from [<804e0660>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85634d40 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018205 r8:84990c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b9000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dfeb3000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:8567778c r4:84da7180 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:ddde2d40 r6:83018200 r5:8567778c r4:84da7180 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84990c00 r8:84da71ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84da7180 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84da7180 r8:8027ade4 r7:dfe91e60 r6:84da7580 r5:84990c00 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfea9fb0 to 0xdfea9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:854d73c0 INFO: task kworker/1:47:4175 is blocked on a mutex likely owned by task kworker/0:39:4180. task:kworker/0:39 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3f164>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7288) r10:8280c9b4 r9:856b0000 r8:80200c04 r7:dfebdd54 r6:ffffffff r5:856b0000 r4:00000000 [<81a3f124>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfebdd20 to 0xdfebdd68) dd20: 820fe000 ed7dd000 00000001 80239bb8 7f079000 00000001 82ac8f44 82ac8320 dd40: 7f079000 ed7dd000 8280c9b4 dfebdd9c dfebdda0 dfebdd70 80230af0 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e0424>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82ac8f64 [<804e01a0>] (__purge_vmap_area_lazy) from [<804e07dc>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfebddc0 r5:dfebde08 r4:dfebddc0 [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc15c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:df9cf000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:84eeb38c r4:84fd8500 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:84eeb38c r4:84fd8500 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856b0000 r8:84fd852c r7:82804d40 r6:dddced40 r5:dddced60 r4:84fd8500 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84fd8500 r8:8027ade4 r7:dfe51e60 r6:84da7700 r5:856b0000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfebdfb0 to 0xdfebdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84fd5e80 INFO: task kworker/0:40:4181 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:40 state:D stack:0 pid:4181 tgid:4181 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3ed30>] (__schedule_loop kernel/sched/core.c:7043 [inline]) [<81a3dd9c>] (__schedule) from [<81a3ed30>] (schedule+0x2c/0x130 kernel/sched/core.c:7058) r10:dfec5d84 r9:00000002 r8:60000113 r7:82916594 r6:dfec5d8c r5:856b6000 r4:856b6000 [<81a3ed04>] (schedule) from [<81a3f118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7115) r5:856b6000 r4:82916590 [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a41978>] (__mutex_lock.constprop.0) from [<81a42470>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfec5e08 r4:00000000 [<81a4245c>] (__mutex_lock_slowpath) from [<81a424b0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a42474>] (mutex_lock) from [<804e0660>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547c240 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856b6000 r7:00000000 r6:83018000 r5:00001000 r4:7f0bb000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dfec1000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:85677b8c r4:84fd8480 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:85677b8c r4:84fd8480 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856b6000 r8:84fd84ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84fd8480 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84fd8480 r8:8027ade4 r7:dfe51e60 r6:84da7780 r5:856b6000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfec5fb0 to 0xdfec5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84fd5e80 INFO: task kworker/0:40:4181 is blocked on a mutex likely owned by task kworker/0:39:4180. task:kworker/0:39 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3f164>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7288) r10:8280c9b4 r9:856b0000 r8:80200c04 r7:dfebdd54 r6:ffffffff r5:856b0000 r4:00000000 [<81a3f124>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfebdd20 to 0xdfebdd68) dd20: 8249f000 ed7dd000 00000001 80239bb8 7f079000 00000001 82ac8f44 82ac8320 dd40: 7f079000 ed7dd000 8280c9b4 dfebdd9c dfebdda0 dfebdd70 80230af0 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e0424>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82ac8f64 [<804e01a0>] (__purge_vmap_area_lazy) from [<804e07dc>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfebddc0 r5:dfebde08 r4:dfebddc0 [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc15c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:df9cf000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:84eeb38c r4:84fd8500 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:84eeb38c r4:84fd8500 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856b0000 r8:84fd852c r7:82804d40 r6:dddced40 r5:dddced60 r4:84fd8500 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84fd8500 r8:8027ade4 r7:dfe51e60 r6:84da7700 r5:856b0000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfebdfb0 to 0xdfebdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84fd5e80 INFO: task kworker/1:49:4182 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:49 state:D stack:0 pid:4182 tgid:4182 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3ed30>] (__schedule_loop kernel/sched/core.c:7043 [inline]) [<81a3dd9c>] (__schedule) from [<81a3ed30>] (schedule+0x2c/0x130 kernel/sched/core.c:7058) r10:dfed5d84 r9:00000002 r8:60000013 r7:82916594 r6:dfed5d8c r5:84996c00 r4:84996c00 [<81a3ed04>] (schedule) from [<81a3f118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7115) r5:84996c00 r4:82916590 [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a41978>] (__mutex_lock.constprop.0) from [<81a42470>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfed5e08 r4:00000000 [<81a4245c>] (__mutex_lock_slowpath) from [<81a424b0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a42474>] (mutex_lock) from [<804e0660>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ca40 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018205 r8:84996c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0bf000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dfeeb000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:85677f8c r4:84da7800 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:ddde2d40 r6:83018200 r5:85677f8c r4:84da7800 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84996c00 r8:84da782c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84da7800 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84da7800 r8:8027ade4 r7:dfea9e60 r6:84da7880 r5:84996c00 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfed5fb0 to 0xdfed5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:8547c1c0 INFO: task kworker/1:49:4182 is blocked on a mutex likely owned by task kworker/0:39:4180. task:kworker/0:39 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3f164>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7288) r10:8280c9b4 r9:856b0000 r8:80200c04 r7:dfebdd54 r6:ffffffff r5:856b0000 r4:00000000 [<81a3f124>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfebdd20 to 0xdfebdd68) dd20: 8249f000 ed7dd000 00000001 80239bb8 7f079000 00000001 82ac8f44 82ac8320 dd40: 7f079000 ed7dd000 8280c9b4 dfebdd9c dfebdda0 dfebdd70 80230af0 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e0424>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82ac8f64 [<804e01a0>] (__purge_vmap_area_lazy) from [<804e07dc>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfebddc0 r5:dfebde08 r4:dfebddc0 [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc15c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:df9cf000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:84eeb38c r4:84fd8500 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:84eeb38c r4:84fd8500 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856b0000 r8:84fd852c r7:82804d40 r6:dddced40 r5:dddced60 r4:84fd8500 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84fd8500 r8:8027ade4 r7:dfe51e60 r6:84da7700 r5:856b0000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfebdfb0 to 0xdfebdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84fd5e80 INFO: task kworker/0:41:4183 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:41 state:D stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3ed30>] (__schedule_loop kernel/sched/core.c:7043 [inline]) [<81a3dd9c>] (__schedule) from [<81a3ed30>] (schedule+0x2c/0x130 kernel/sched/core.c:7058) r10:dfdd5d84 r9:00000002 r8:60000113 r7:82916594 r6:dfdd5d8c r5:856b8000 r4:856b8000 [<81a3ed04>] (schedule) from [<81a3f118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7115) r5:856b8000 r4:82916590 [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a41978>] (__mutex_lock.constprop.0) from [<81a42470>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfdd5e08 r4:00000000 [<81a4245c>] (__mutex_lock_slowpath) from [<81a424b0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a42474>] (mutex_lock) from [<804e0660>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fd5040 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856b8000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c1000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dfef7000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:855fcf8c r4:84fd8580 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:855fcf8c r4:84fd8580 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856b8000 r8:84fd85ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84fd8580 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84fd8580 r8:8027ade4 r7:dfe51e60 r6:84da7980 r5:856b8000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfdd5fb0 to 0xdfdd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84fd5640 INFO: task kworker/0:41:4183 is blocked on a mutex likely owned by task kworker/0:39:4180. task:kworker/0:39 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3f164>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7288) r10:8280c9b4 r9:856b0000 r8:80200c04 r7:dfebdd54 r6:ffffffff r5:856b0000 r4:00000000 [<81a3f124>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfebdd20 to 0xdfebdd68) dd20: 826a6000 ed7dd000 00000001 80239bb8 7f079000 00000001 82ac8f44 82ac8320 dd40: 7f079000 ed7dd000 8280c9b4 dfebdd9c dfebdda0 dfebdd70 80230af0 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e0424>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82ac8f64 [<804e01a0>] (__purge_vmap_area_lazy) from [<804e07dc>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfebddc0 r5:dfebde08 r4:dfebddc0 [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc15c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:df9cf000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:84eeb38c r4:84fd8500 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:84eeb38c r4:84fd8500 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856b0000 r8:84fd852c r7:82804d40 r6:dddced40 r5:dddced60 r4:84fd8500 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84fd8500 r8:8027ade4 r7:dfe51e60 r6:84da7700 r5:856b0000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfebdfb0 to 0xdfebdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84fd5e80 INFO: task kworker/1:50:4187 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:50 state:D stack:0 pid:4187 tgid:4187 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3ed30>] (__schedule_loop kernel/sched/core.c:7043 [inline]) [<81a3dd9c>] (__schedule) from [<81a3ed30>] (schedule+0x2c/0x130 kernel/sched/core.c:7058) r10:dfee5d84 r9:00000002 r8:60000113 r7:82916594 r6:dfee5d8c r5:856ba400 r4:856ba400 [<81a3ed04>] (schedule) from [<81a3f118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7115) r5:856ba400 r4:82916590 [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a41978>] (__mutex_lock.constprop.0) from [<81a42470>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfee5e08 r4:00000000 [<81a4245c>] (__mutex_lock_slowpath) from [<81a424b0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a42474>] (mutex_lock) from [<804e0660>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547c680 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018205 r8:856ba400 r7:00000000 r6:83018200 r5:00001000 r4:7f0bd000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dfed1000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:8567538c r4:84da7a80 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:ddde2d40 r6:83018200 r5:8567538c r4:84da7a80 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856ba400 r8:84da7aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84da7a80 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84da7a80 r8:8027ade4 r7:dfed5e60 r6:84da7b00 r5:856ba400 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfee5fb0 to 0xdfee5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:8547c6c0 INFO: task kworker/1:50:4187 is blocked on a mutex likely owned by task kworker/0:39:4180. task:kworker/0:39 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3f164>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7288) r10:8280c9b4 r9:856b0000 r8:80200c04 r7:dfebdd54 r6:ffffffff r5:856b0000 r4:00000000 [<81a3f124>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfebdd20 to 0xdfebdd68) dd20: 826a6000 ed7dd000 00000001 80239bb8 7f079000 00000001 82ac8f44 82ac8320 dd40: 7f079000 ed7dd000 8280c9b4 dfebdd9c dfebdda0 dfebdd70 80230af0 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e0424>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82ac8f64 [<804e01a0>] (__purge_vmap_area_lazy) from [<804e07dc>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfebddc0 r5:dfebde08 r4:dfebddc0 [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc15c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:df9cf000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:84eeb38c r4:84fd8500 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:84eeb38c r4:84fd8500 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856b0000 r8:84fd852c r7:82804d40 r6:dddced40 r5:dddced60 r4:84fd8500 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84fd8500 r8:8027ade4 r7:dfe51e60 r6:84da7700 r5:856b0000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfebdfb0 to 0xdfebdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84fd5e80 INFO: task kworker/1:51:4189 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:51 state:D stack:0 pid:4189 tgid:4189 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3ed30>] (__schedule_loop kernel/sched/core.c:7043 [inline]) [<81a3dd9c>] (__schedule) from [<81a3ed30>] (schedule+0x2c/0x130 kernel/sched/core.c:7058) r10:dfe11d84 r9:00000002 r8:60000013 r7:82916594 r6:dfe11d8c r5:856bbc00 r4:856bbc00 [<81a3ed04>] (schedule) from [<81a3f118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7115) r5:856bbc00 r4:82916590 [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a41978>] (__mutex_lock.constprop.0) from [<81a42470>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe11e08 r4:00000000 [<81a4245c>] (__mutex_lock_slowpath) from [<81a424b0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a42474>] (mutex_lock) from [<804e0660>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f33740 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018205 r8:856bbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0d1000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dff7b000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:8568478c r4:84da7b80 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:ddde2d40 r6:83018200 r5:8568478c r4:84da7b80 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856bbc00 r8:84da7bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84da7b80 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84da7b80 r8:8027ade4 r7:dfed5e60 r6:84da7c00 r5:856bbc00 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe11fb0 to 0xdfe11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:8547c940 INFO: task kworker/1:51:4189 is blocked on a mutex likely owned by task kworker/0:39:4180. task:kworker/0:39 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3f164>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7288) r10:8280c9b4 r9:856b0000 r8:80200c04 r7:dfebdd54 r6:ffffffff r5:856b0000 r4:00000000 [<81a3f124>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfebdd20 to 0xdfebdd68) dd20: 826a6000 ed7dd000 00000001 80239bb8 7f079000 00000001 82ac8f44 82ac8320 dd40: 7f079000 ed7dd000 8280c9b4 dfebdd9c dfebdda0 dfebdd70 80230af0 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e0424>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82ac8f64 [<804e01a0>] (__purge_vmap_area_lazy) from [<804e07dc>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfebddc0 r5:dfebde08 r4:dfebddc0 [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc15c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:df9cf000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:84eeb38c r4:84fd8500 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:84eeb38c r4:84fd8500 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856b0000 r8:84fd852c r7:82804d40 r6:dddced40 r5:dddced60 r4:84fd8500 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84fd8500 r8:8027ade4 r7:dfe51e60 r6:84da7700 r5:856b0000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfebdfb0 to 0xdfebdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84fd5e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:42:4191 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:42 state:D stack:0 pid:4191 tgid:4191 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3ed30>] (__schedule_loop kernel/sched/core.c:7043 [inline]) [<81a3dd9c>] (__schedule) from [<81a3ed30>] (schedule+0x2c/0x130 kernel/sched/core.c:7058) r10:dff11d84 r9:00000002 r8:60000013 r7:82916594 r6:dff11d8c r5:856b8c00 r4:856b8c00 [<81a3ed04>] (schedule) from [<81a3f118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7115) r5:856b8c00 r4:82916590 [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a41978>] (__mutex_lock.constprop.0) from [<81a42470>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff11e08 r4:00000000 [<81a4245c>] (__mutex_lock_slowpath) from [<81a424b0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a42474>] (mutex_lock) from [<804e0660>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84974500 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dfab3000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:8560ab8c r4:84fd8680 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:8560ab8c r4:84fd8680 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856b8c00 r8:84fd86ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84fd8680 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84fd8680 r8:8027ade4 r7:dfe51e60 r6:84da7c80 r5:856b8c00 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff11fb0 to 0xdff11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84f2aec0 INFO: task kworker/0:42:4191 is blocked on a mutex likely owned by task kworker/0:39:4180. task:kworker/0:39 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3f164>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7288) r10:8280c9b4 r9:856b0000 r8:80200c04 r7:dfebdd54 r6:ffffffff r5:856b0000 r4:00000000 [<81a3f124>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfebdd20 to 0xdfebdd68) dd20: 82882000 ed7dd000 00000001 80239bb8 7f079000 00000001 82ac8f44 82ac8320 dd40: 7f079000 ed7dd000 8280c9b4 dfebdd9c dfebdda0 dfebdd70 80230af0 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e0424>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82ac8f64 [<804e01a0>] (__purge_vmap_area_lazy) from [<804e07dc>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfebddc0 r5:dfebde08 r4:dfebddc0 [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc15c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:df9cf000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:84eeb38c r4:84fd8500 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:84eeb38c r4:84fd8500 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856b0000 r8:84fd852c r7:82804d40 r6:dddced40 r5:dddced60 r4:84fd8500 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84fd8500 r8:8027ade4 r7:dfe51e60 r6:84da7700 r5:856b0000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfebdfb0 to 0xdfebdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84fd5e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:43:4194 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:43 state:D stack:0 pid:4194 tgid:4194 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3ed30>] (__schedule_loop kernel/sched/core.c:7043 [inline]) [<81a3dd9c>] (__schedule) from [<81a3ed30>] (schedule+0x2c/0x130 kernel/sched/core.c:7058) r10:dff19d84 r9:00000002 r8:60000113 r7:82916594 r6:dff19d8c r5:856bc800 r4:856bc800 [<81a3ed04>] (schedule) from [<81a3f118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7115) r5:856bc800 r4:82916590 [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a41978>] (__mutex_lock.constprop.0) from [<81a42470>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff19e08 r4:00000000 [<81a4245c>] (__mutex_lock_slowpath) from [<81a424b0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a42474>] (mutex_lock) from [<804e0660>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc14c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856bc800 r7:00000000 r6:83018000 r5:00001000 r4:7f0c5000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dff0d000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:84fef38c r4:84fd8600 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:84fef38c r4:84fd8600 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856bc800 r8:84fd862c r7:82804d40 r6:dddced40 r5:dddced60 r4:84fd8600 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84fd8600 r8:8027ade4 r7:dff11e60 r6:84da7d00 r5:856bc800 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff19fb0 to 0xdff19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:855ea000 INFO: task kworker/0:43:4194 is blocked on a mutex likely owned by task kworker/0:39:4180. task:kworker/0:39 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3f164>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7288) r10:8280c9b4 r9:856b0000 r8:80200c04 r7:dfebdd54 r6:ffffffff r5:856b0000 r4:00000000 [<81a3f124>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfebdd20 to 0xdfebdd68) dd20: 82882000 ed7dd000 00000001 80239bb8 7f079000 00000001 82ac8f44 82ac8320 dd40: 7f079000 ed7dd000 8280c9b4 dfebdd9c dfebdda0 dfebdd70 80230af0 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e0424>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82ac8f64 [<804e01a0>] (__purge_vmap_area_lazy) from [<804e07dc>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfebddc0 r5:dfebde08 r4:dfebddc0 [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc15c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:df9cf000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:84eeb38c r4:84fd8500 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:84eeb38c r4:84fd8500 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856b0000 r8:84fd852c r7:82804d40 r6:dddced40 r5:dddced60 r4:84fd8500 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84fd8500 r8:8027ade4 r7:dfe51e60 r6:84da7700 r5:856b0000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfebdfb0 to 0xdfebdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84fd5e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:52:4196 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:52 state:D stack:0 pid:4196 tgid:4196 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3ed30>] (__schedule_loop kernel/sched/core.c:7043 [inline]) [<81a3dd9c>] (__schedule) from [<81a3ed30>] (schedule+0x2c/0x130 kernel/sched/core.c:7058) r10:dff21d84 r9:00000002 r8:60000113 r7:82916594 r6:dff21d8c r5:856be000 r4:856be000 [<81a3ed04>] (schedule) from [<81a3f118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7115) r5:856be000 r4:82916590 [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a41978>] (__mutex_lock.constprop.0) from [<81a42470>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff21e08 r4:00000000 [<81a4245c>] (__mutex_lock_slowpath) from [<81a424b0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a42474>] (mutex_lock) from [<804e0660>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc1440 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018205 r8:856be000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c7000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dff2b000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:8560838c r4:84da7d80 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:ddde2d40 r6:83018200 r5:8560838c r4:84da7d80 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856be000 r8:84da7dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84da7d80 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84da7d80 r8:8027ade4 r7:dfe11e60 r6:84da7e00 r5:856be000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff21fb0 to 0xdff21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:8547cdc0 INFO: task kworker/1:52:4196 is blocked on a mutex likely owned by task kworker/0:39:4180. task:kworker/0:39 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3f164>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7288) r10:8280c9b4 r9:856b0000 r8:80200c04 r7:dfebdd54 r6:ffffffff r5:856b0000 r4:00000000 [<81a3f124>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfebdd20 to 0xdfebdd68) dd20: 82b22000 ed7dd000 00000001 80239bb8 7f079000 00000001 82ac8f44 82ac8320 dd40: 7f079000 ed7dd000 8280c9b4 dfebdd9c dfebdda0 dfebdd70 80230af0 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e0424>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82ac8f64 [<804e01a0>] (__purge_vmap_area_lazy) from [<804e07dc>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfebddc0 r5:dfebde08 r4:dfebddc0 [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc15c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:df9cf000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:84eeb38c r4:84fd8500 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:84eeb38c r4:84fd8500 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856b0000 r8:84fd852c r7:82804d40 r6:dddced40 r5:dddced60 r4:84fd8500 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84fd8500 r8:8027ade4 r7:dfe51e60 r6:84da7700 r5:856b0000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfebdfb0 to 0xdfebdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84fd5e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:44:4197 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:44 state:D stack:0 pid:4197 tgid:4197 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3ed30>] (__schedule_loop kernel/sched/core.c:7043 [inline]) [<81a3dd9c>] (__schedule) from [<81a3ed30>] (schedule+0x2c/0x130 kernel/sched/core.c:7058) r10:dff31d84 r9:00000002 r8:60000113 r7:82916594 r6:dff31d8c r5:856bec00 r4:856bec00 [<81a3ed04>] (schedule) from [<81a3f118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7115) r5:856bec00 r4:82916590 [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a41978>] (__mutex_lock.constprop.0) from [<81a42470>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff31e08 r4:00000000 [<81a4245c>] (__mutex_lock_slowpath) from [<81a424b0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a42474>] (mutex_lock) from [<804e0660>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547c200 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856bec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c9000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dff3b000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:85676f8c r4:84fd8780 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:85676f8c r4:84fd8780 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856bec00 r8:84fd87ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84fd8780 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84fd8780 r8:8027ade4 r7:dff11e60 r6:84da7e80 r5:856bec00 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff31fb0 to 0xdff31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84fc1440 INFO: task kworker/0:44:4197 is blocked on a mutex likely owned by task kworker/0:39:4180. task:kworker/0:39 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3f164>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7288) r10:8280c9b4 r9:856b0000 r8:80200c04 r7:dfebdd54 r6:ffffffff r5:856b0000 r4:00000000 [<81a3f124>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfebdd20 to 0xdfebdd68) dd20: 82b22000 ed7dd000 00000001 80239bb8 7f079000 00000001 82ac8f44 82ac8320 dd40: 7f079000 ed7dd000 8280c9b4 dfebdd9c dfebdda0 dfebdd70 80230af0 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e0424>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82ac8f64 [<804e01a0>] (__purge_vmap_area_lazy) from [<804e07dc>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfebddc0 r5:dfebde08 r4:dfebddc0 [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc15c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:df9cf000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:84eeb38c r4:84fd8500 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:84eeb38c r4:84fd8500 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856b0000 r8:84fd852c r7:82804d40 r6:dddced40 r5:dddced60 r4:84fd8500 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84fd8500 r8:8027ade4 r7:dfe51e60 r6:84da7700 r5:856b0000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfebdfb0 to 0xdfebdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84fd5e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:53:4200 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:53 state:D stack:0 pid:4200 tgid:4200 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3ed30>] (__schedule_loop kernel/sched/core.c:7043 [inline]) [<81a3dd9c>] (__schedule) from [<81a3ed30>] (schedule+0x2c/0x130 kernel/sched/core.c:7058) r10:dfed9d84 r9:00000002 r8:60000013 r7:82916594 r6:dfed9d8c r5:856b9800 r4:856b9800 [<81a3ed04>] (schedule) from [<81a3f118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7115) r5:856b9800 r4:82916590 [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a41978>] (__mutex_lock.constprop.0) from [<81a42470>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfed9e08 r4:00000000 [<81a4245c>] (__mutex_lock_slowpath) from [<81a424b0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a42474>] (mutex_lock) from [<804e0660>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f33a00 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018205 r8:856b9800 r7:00000000 r6:83018200 r5:00001000 r4:7f0d3000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dff89000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:8568438c r4:84da7f00 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:ddde2d40 r6:83018200 r5:8568438c r4:84da7f00 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856b9800 r8:84da7f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84da7f00 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84da7f00 r8:8027ade4 r7:dfe11e60 r6:84da7f80 r5:856b9800 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfed9fb0 to 0xdfed9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:8547c540 INFO: task kworker/1:53:4200 is blocked on a mutex likely owned by task kworker/0:39:4180. task:kworker/0:39 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3f164>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7288) r10:8280c9b4 r9:856b0000 r8:80200c04 r7:dfebdd54 r6:ffffffff r5:856b0000 r4:00000000 [<81a3f124>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfebdd20 to 0xdfebdd68) dd20: 82b22000 ed7dd000 00000001 80239bb8 7f079000 00000001 82ac8f44 82ac8320 dd40: 7f079000 ed7dd000 8280c9b4 dfebdd9c dfebdda0 dfebdd70 80230af0 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e0424>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82ac8f64 [<804e01a0>] (__purge_vmap_area_lazy) from [<804e07dc>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfebddc0 r5:dfebde08 r4:dfebddc0 [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc15c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:df9cf000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:84eeb38c r4:84fd8500 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:84eeb38c r4:84fd8500 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856b0000 r8:84fd852c r7:82804d40 r6:dddced40 r5:dddced60 r4:84fd8500 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84fd8500 r8:8027ade4 r7:dfe51e60 r6:84da7700 r5:856b0000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfebdfb0 to 0xdfebdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84fd5e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:45:4202 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:45 state:D stack:0 pid:4202 tgid:4202 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3ed30>] (__schedule_loop kernel/sched/core.c:7043 [inline]) [<81a3dd9c>] (__schedule) from [<81a3ed30>] (schedule+0x2c/0x130 kernel/sched/core.c:7058) r10:dff59d84 r9:00000002 r8:60000113 r7:82916594 r6:dff59d8c r5:856bd400 r4:856bd400 [<81a3ed04>] (schedule) from [<81a3f118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7115) r5:856bd400 r4:82916590 [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a41978>] (__mutex_lock.constprop.0) from [<81a42470>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff59e08 r4:00000000 [<81a4245c>] (__mutex_lock_slowpath) from [<81a424b0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a42474>] (mutex_lock) from [<804e0660>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547c2c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856bd400 r7:00000000 r6:83018000 r5:00001000 r4:7f0cb000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dff45000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:85608b8c r4:84fd8800 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:85608b8c r4:84fd8800 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856bd400 r8:84fd882c r7:82804d40 r6:dddced40 r5:dddced60 r4:84fd8800 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84fd8800 r8:8027ade4 r7:dff11e60 r6:84fbbf00 r5:856bd400 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff59fb0 to 0xdff59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:855ea000 INFO: task kworker/0:45:4202 is blocked on a mutex likely owned by task kworker/0:39:4180. task:kworker/0:39 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3f164>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7288) r10:8280c9b4 r9:856b0000 r8:80200c04 r7:dfebdd54 r6:ffffffff r5:856b0000 r4:00000000 [<81a3f124>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfebdd20 to 0xdfebdd68) dd20: 830d8000 ed7dd000 00000001 80239bb8 7f079000 00000001 82ac8f44 82ac8320 dd40: 7f079000 ed7dd000 8280c9b4 dfebdd9c dfebdda0 dfebdd70 80230af0 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e0424>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82ac8f64 [<804e01a0>] (__purge_vmap_area_lazy) from [<804e07dc>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfebddc0 r5:dfebde08 r4:dfebddc0 [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc15c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:df9cf000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:84eeb38c r4:84fd8500 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:84eeb38c r4:84fd8500 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856b0000 r8:84fd852c r7:82804d40 r6:dddced40 r5:dddced60 r4:84fd8500 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84fd8500 r8:8027ade4 r7:dfe51e60 r6:84da7700 r5:856b0000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfebdfb0 to 0xdfebdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84fd5e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:46:4204 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:46 state:D stack:0 pid:4204 tgid:4204 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3ed30>] (__schedule_loop kernel/sched/core.c:7043 [inline]) [<81a3dd9c>] (__schedule) from [<81a3ed30>] (schedule+0x2c/0x130 kernel/sched/core.c:7058) r10:dff1dd84 r9:00000002 r8:60000113 r7:82916594 r6:dff1dd8c r5:856bb000 r4:856bb000 [<81a3ed04>] (schedule) from [<81a3f118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7115) r5:856bb000 r4:82916590 [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a41978>] (__mutex_lock.constprop.0) from [<81a42470>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff1de08 r4:00000000 [<81a4245c>] (__mutex_lock_slowpath) from [<81a424b0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a42474>] (mutex_lock) from [<804e0660>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855ee0c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856bb000 r7:00000000 r6:83018000 r5:00001000 r4:7f0cd000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dff51000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:8567478c r4:84fd8900 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:8567478c r4:84fd8900 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856bb000 r8:84fd892c r7:82804d40 r6:dddced40 r5:dddced60 r4:84fd8900 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84fd8900 r8:8027ade4 r7:dff11e60 r6:84fbbc80 r5:856bb000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff1dfb0 to 0xdff1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:855ee0c0 INFO: task kworker/0:46:4204 is blocked on a mutex likely owned by task kworker/0:39:4180. task:kworker/0:39 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3f164>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7288) r10:8280c9b4 r9:856b0000 r8:80200c04 r7:dfebdd54 r6:ffffffff r5:856b0000 r4:00000000 [<81a3f124>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfebdd20 to 0xdfebdd68) dd20: 831c2000 ed7dd000 00000001 80239bb8 7f079000 00000001 82ac8f44 82ac8320 dd40: 7f079000 ed7dd000 8280c9b4 dfebdd9c dfebdda0 dfebdd70 80230af0 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e0424>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82ac8f64 [<804e01a0>] (__purge_vmap_area_lazy) from [<804e07dc>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfebddc0 r5:dfebde08 r4:dfebddc0 [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc15c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:df9cf000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:84eeb38c r4:84fd8500 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:84eeb38c r4:84fd8500 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856b0000 r8:84fd852c r7:82804d40 r6:dddced40 r5:dddced60 r4:84fd8500 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84fd8500 r8:8027ade4 r7:dfe51e60 r6:84da7700 r5:856b0000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfebdfb0 to 0xdfebdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84fd5e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:47:4207 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:47 state:D stack:0 pid:4207 tgid:4207 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3ed30>] (__schedule_loop kernel/sched/core.c:7043 [inline]) [<81a3dd9c>] (__schedule) from [<81a3ed30>] (schedule+0x2c/0x130 kernel/sched/core.c:7058) r10:dff75d84 r9:00000002 r8:60000113 r7:82916594 r6:dff75d8c r5:855b1800 r4:855b1800 [<81a3ed04>] (schedule) from [<81a3f118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7115) r5:855b1800 r4:82916590 [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a41978>] (__mutex_lock.constprop.0) from [<81a42470>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff75e08 r4:00000000 [<81a4245c>] (__mutex_lock_slowpath) from [<81a424b0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a42474>] (mutex_lock) from [<804e0660>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f2af80 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:855b1800 r7:00000000 r6:83018000 r5:00001000 r4:7f0cf000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dff67000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:85608f8c r4:84fd8880 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:85608f8c r4:84fd8880 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855b1800 r8:84fd88ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84fd8880 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84fd8880 r8:8027ade4 r7:dff11e60 r6:85639080 r5:855b1800 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff75fb0 to 0xdff75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84f32580 INFO: task kworker/0:47:4207 is blocked on a mutex likely owned by task kworker/0:39:4180. task:kworker/0:39 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3f164>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7288) r10:8280c9b4 r9:856b0000 r8:80200c04 r7:dfebdd54 r6:ffffffff r5:856b0000 r4:00000000 [<81a3f124>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfebdd20 to 0xdfebdd68) dd20: 833bb000 ed7dd000 00000001 80239bb8 7f079000 00000001 82ac8f44 82ac8320 dd40: 7f079000 ed7dd000 8280c9b4 dfebdd9c dfebdda0 dfebdd70 80230af0 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e0424>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82ac8f64 [<804e01a0>] (__purge_vmap_area_lazy) from [<804e07dc>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfebddc0 r5:dfebde08 r4:dfebddc0 [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc15c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:df9cf000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:84eeb38c r4:84fd8500 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:84eeb38c r4:84fd8500 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856b0000 r8:84fd852c r7:82804d40 r6:dddced40 r5:dddced60 r4:84fd8500 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84fd8500 r8:8027ade4 r7:dfe51e60 r6:84da7700 r5:856b0000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfebdfb0 to 0xdfebdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84fd5e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:48:4208 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:48 state:D stack:0 pid:4208 tgid:4208 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3ed30>] (__schedule_loop kernel/sched/core.c:7043 [inline]) [<81a3dd9c>] (__schedule) from [<81a3ed30>] (schedule+0x2c/0x130 kernel/sched/core.c:7058) r10:dff79d84 r9:00000002 r8:60000013 r7:82916594 r6:dff79d8c r5:855b2400 r4:855b2400 [<81a3ed04>] (schedule) from [<81a3f118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7115) r5:855b2400 r4:82916590 [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a41978>] (__mutex_lock.constprop.0) from [<81a42470>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff79e08 r4:00000000 [<81a4245c>] (__mutex_lock_slowpath) from [<81a424b0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a42474>] (mutex_lock) from [<804e0660>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84974880 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:855b2400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dfad3000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:8560af8c r4:84fd8980 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:8560af8c r4:84fd8980 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855b2400 r8:84fd89ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84fd8980 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84fd8980 r8:8027ade4 r7:dff11e60 r6:85639100 r5:855b2400 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff79fb0 to 0xdff79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:85634900 INFO: task kworker/0:48:4208 is blocked on a mutex likely owned by task kworker/0:39:4180. task:kworker/0:39 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3f164>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7288) r10:8280c9b4 r9:856b0000 r8:80200c04 r7:dfebdd54 r6:ffffffff r5:856b0000 r4:00000000 [<81a3f124>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfebdd20 to 0xdfebdd68) dd20: 834c6000 ed7dd000 00000001 80239bb8 7f079000 00000001 82ac8f44 82ac8320 dd40: 7f079000 ed7dd000 8280c9b4 dfebdd9c dfebdda0 dfebdd70 80230af0 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e0424>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82ac8f64 [<804e01a0>] (__purge_vmap_area_lazy) from [<804e07dc>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfebddc0 r5:dfebde08 r4:dfebddc0 [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc15c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:df9cf000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:84eeb38c r4:84fd8500 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:84eeb38c r4:84fd8500 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856b0000 r8:84fd852c r7:82804d40 r6:dddced40 r5:dddced60 r4:84fd8500 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84fd8500 r8:8027ade4 r7:dfe51e60 r6:84da7700 r5:856b0000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfebdfb0 to 0xdfebdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84fd5e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:54:4211 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:54 state:D stack:0 pid:4211 tgid:4211 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3ed30>] (__schedule_loop kernel/sched/core.c:7043 [inline]) [<81a3dd9c>] (__schedule) from [<81a3ed30>] (schedule+0x2c/0x130 kernel/sched/core.c:7058) r10:dfeb1d84 r9:00000002 r8:60000013 r7:82916594 r6:dfeb1d8c r5:855b3000 r4:855b3000 [<81a3ed04>] (schedule) from [<81a3f118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7115) r5:855b3000 r4:82916590 [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a41978>] (__mutex_lock.constprop.0) from [<81a42470>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfeb1e08 r4:00000000 [<81a4245c>] (__mutex_lock_slowpath) from [<81a424b0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a42474>] (mutex_lock) from [<804e0660>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f33d00 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018205 r8:855b3000 r7:00000000 r6:83018200 r5:00001000 r4:7f0d7000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:e02a4000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:8568538c r4:85639200 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:ddde2d40 r6:83018200 r5:8568538c r4:85639200 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855b3000 r8:8563922c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85639200 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85639200 r8:8027ade4 r7:dfed9e60 r6:85639300 r5:855b3000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfeb1fb0 to 0xdfeb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84f33900 INFO: task kworker/1:54:4211 is blocked on a mutex likely owned by task kworker/0:39:4180. task:kworker/0:39 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3f164>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7288) r10:8280c9b4 r9:856b0000 r8:80200c04 r7:dfebdd54 r6:ffffffff r5:856b0000 r4:00000000 [<81a3f124>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfebdd20 to 0xdfebdd68) dd20: 837b5000 ed7dd000 00000001 80239bb8 7f079000 00000001 82ac8f44 82ac8320 dd40: 7f079000 ed7dd000 8280c9b4 dfebdd9c dfebdda0 dfebdd70 80230af0 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e0424>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82ac8f64 [<804e01a0>] (__purge_vmap_area_lazy) from [<804e07dc>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfebddc0 r5:dfebde08 r4:dfebddc0 [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc15c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:df9cf000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:84eeb38c r4:84fd8500 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:84eeb38c r4:84fd8500 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856b0000 r8:84fd852c r7:82804d40 r6:dddced40 r5:dddced60 r4:84fd8500 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84fd8500 r8:8027ade4 r7:dfe51e60 r6:84da7700 r5:856b0000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfebdfb0 to 0xdfebdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84fd5e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:55:4213 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:55 state:D stack:0 pid:4213 tgid:4213 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3ed30>] (__schedule_loop kernel/sched/core.c:7043 [inline]) [<81a3dd9c>] (__schedule) from [<81a3ed30>] (schedule+0x2c/0x130 kernel/sched/core.c:7058) r10:dff15d84 r9:00000002 r8:60000013 r7:82916594 r6:dff15d8c r5:855b0000 r4:855b0000 [<81a3ed04>] (schedule) from [<81a3f118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7115) r5:855b0000 r4:82916590 [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a41978>] (__mutex_lock.constprop.0) from [<81a42470>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff15e08 r4:00000000 [<81a4245c>] (__mutex_lock_slowpath) from [<81a424b0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a42474>] (mutex_lock) from [<804e0660>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fb6fc0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018205 r8:855b0000 r7:00000000 r6:83018200 r5:00001000 r4:7f0d5000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dff95000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:85609b8c r4:85639380 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:ddde2d40 r6:83018200 r5:85609b8c r4:85639380 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855b0000 r8:856393ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85639380 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85639380 r8:8027ade4 r7:dfeb1e60 r6:85639400 r5:855b0000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff15fb0 to 0xdff15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84f33900 INFO: task kworker/1:55:4213 is blocked on a mutex likely owned by task kworker/0:39:4180. task:kworker/0:39 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3f164>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7288) r10:8280c9b4 r9:856b0000 r8:80200c04 r7:dfebdd54 r6:ffffffff r5:856b0000 r4:00000000 [<81a3f124>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfebdd20 to 0xdfebdd68) dd20: 837b5000 ed7dd000 00000001 80239bb8 7f079000 00000001 82ac8f44 82ac8320 dd40: 7f079000 ed7dd000 8280c9b4 dfebdd9c dfebdda0 dfebdd70 80230af0 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e0424>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82ac8f64 [<804e01a0>] (__purge_vmap_area_lazy) from [<804e07dc>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfebddc0 r5:dfebde08 r4:dfebddc0 [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc15c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:df9cf000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:84eeb38c r4:84fd8500 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:84eeb38c r4:84fd8500 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856b0000 r8:84fd852c r7:82804d40 r6:dddced40 r5:dddced60 r4:84fd8500 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84fd8500 r8:8027ade4 r7:dfe51e60 r6:84da7700 r5:856b0000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfebdfb0 to 0xdfebdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84fd5e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:56:4215 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:56 state:D stack:0 pid:4215 tgid:4215 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3ed30>] (__schedule_loop kernel/sched/core.c:7043 [inline]) [<81a3dd9c>] (__schedule) from [<81a3ed30>] (schedule+0x2c/0x130 kernel/sched/core.c:7058) r10:dff99d84 r9:00000002 r8:60000113 r7:82916594 r6:dff99d8c r5:855b4800 r4:855b4800 [<81a3ed04>] (schedule) from [<81a3f118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7115) r5:855b4800 r4:82916590 [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a41978>] (__mutex_lock.constprop.0) from [<81a42470>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff99e08 r4:00000000 [<81a4245c>] (__mutex_lock_slowpath) from [<81a424b0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a42474>] (mutex_lock) from [<804e0660>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f333c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018205 r8:855b4800 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dfa7f000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:85685b8c r4:85639480 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:ddde2d40 r6:83018200 r5:85685b8c r4:85639480 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855b4800 r8:856394ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85639480 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85639480 r8:8027ade4 r7:dfeb1e60 r6:85639500 r5:855b4800 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff99fb0 to 0xdff99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84f33c00 INFO: task kworker/1:56:4215 is blocked on a mutex likely owned by task kworker/0:39:4180. task:kworker/0:39 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3f164>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7288) r10:8280c9b4 r9:856b0000 r8:80200c04 r7:dfebdd54 r6:ffffffff r5:856b0000 r4:00000000 [<81a3f124>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfebdd20 to 0xdfebdd68) dd20: 838dd000 ed7dd000 00000001 80239bb8 7f079000 00000001 82ac8f44 82ac8320 dd40: 7f079000 ed7dd000 8280c9b4 dfebdd9c dfebdda0 dfebdd70 80230af0 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e0424>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82ac8f64 [<804e01a0>] (__purge_vmap_area_lazy) from [<804e07dc>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfebddc0 r5:dfebde08 r4:dfebddc0 [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc15c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:df9cf000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:84eeb38c r4:84fd8500 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:84eeb38c r4:84fd8500 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856b0000 r8:84fd852c r7:82804d40 r6:dddced40 r5:dddced60 r4:84fd8500 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84fd8500 r8:8027ade4 r7:dfe51e60 r6:84da7700 r5:856b0000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfebdfb0 to 0xdfebdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84fd5e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:57:4217 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:57 state:D stack:0 pid:4217 tgid:4217 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3ed30>] (__schedule_loop kernel/sched/core.c:7043 [inline]) [<81a3dd9c>] (__schedule) from [<81a3ed30>] (schedule+0x2c/0x130 kernel/sched/core.c:7058) r10:dff5dd84 r9:00000002 r8:60000113 r7:82916594 r6:dff5dd8c r5:855b5400 r4:855b5400 [<81a3ed04>] (schedule) from [<81a3f118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7115) r5:855b5400 r4:82916590 [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a41978>] (__mutex_lock.constprop.0) from [<81a42470>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff5de08 r4:00000000 [<81a4245c>] (__mutex_lock_slowpath) from [<81a424b0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a42474>] (mutex_lock) from [<804e0660>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8563d3c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018205 r8:855b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dfc83000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:8561578c r4:85639600 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:ddde2d40 r6:83018200 r5:8561578c r4:85639600 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855b5400 r8:8563962c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85639600 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85639600 r8:8027ade4 r7:dff99e60 r6:85639680 r5:855b5400 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff5dfb0 to 0xdff5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84f33a40 INFO: task kworker/1:57:4217 is blocked on a mutex likely owned by task kworker/0:39:4180. task:kworker/0:39 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3f164>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7288) r10:8280c9b4 r9:856b0000 r8:80200c04 r7:dfebdd54 r6:ffffffff r5:856b0000 r4:00000000 [<81a3f124>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfebdd20 to 0xdfebdd68) dd20: 83bac000 ed7dd000 00000001 80239bb8 7f079000 00000001 82ac8f44 82ac8320 dd40: 7f079000 ed7dd000 8280c9b4 dfebdd9c dfebdda0 dfebdd70 80230af0 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e0424>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82ac8f64 [<804e01a0>] (__purge_vmap_area_lazy) from [<804e07dc>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfebddc0 r5:dfebde08 r4:dfebddc0 [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc15c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:df9cf000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:84eeb38c r4:84fd8500 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:84eeb38c r4:84fd8500 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856b0000 r8:84fd852c r7:82804d40 r6:dddced40 r5:dddced60 r4:84fd8500 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84fd8500 r8:8027ade4 r7:dfe51e60 r6:84da7700 r5:856b0000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfebdfb0 to 0xdfebdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84fd5e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:58:4220 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:58 state:D stack:0 pid:4220 tgid:4220 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3ed30>] (__schedule_loop kernel/sched/core.c:7043 [inline]) [<81a3dd9c>] (__schedule) from [<81a3ed30>] (schedule+0x2c/0x130 kernel/sched/core.c:7058) r10:dfab1d84 r9:00000002 r8:60000113 r7:82916594 r6:dfab1d8c r5:856aec00 r4:856aec00 [<81a3ed04>] (schedule) from [<81a3f118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7115) r5:856aec00 r4:82916590 [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a41978>] (__mutex_lock.constprop.0) from [<81a42470>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfab1e08 r4:00000000 [<81a4245c>] (__mutex_lock_slowpath) from [<81a424b0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a42474>] (mutex_lock) from [<804e0660>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85638e00 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018205 r8:856aec00 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dfa05000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:8562038c r4:85639700 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:ddde2d40 r6:83018200 r5:8562038c r4:85639700 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856aec00 r8:8563972c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85639700 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85639700 r8:8027ade4 r7:dff5de60 r6:84fd8a00 r5:856aec00 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfab1fb0 to 0xdfab1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84f33e40 INFO: task kworker/1:58:4220 is blocked on a mutex likely owned by task kworker/0:39:4180. task:kworker/0:39 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3f164>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7288) r10:8280c9b4 r9:856b0000 r8:80200c04 r7:dfebdd54 r6:ffffffff r5:856b0000 r4:00000000 [<81a3f124>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfebdd20 to 0xdfebdd68) dd20: 83bd2000 ed7dd000 00000001 80239bb8 7f079000 00000001 82ac8f44 82ac8320 dd40: 7f079000 ed7dd000 8280c9b4 dfebdd9c dfebdda0 dfebdd70 80230af0 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e0424>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82ac8f64 [<804e01a0>] (__purge_vmap_area_lazy) from [<804e07dc>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfebddc0 r5:dfebde08 r4:dfebddc0 [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc15c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:df9cf000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:84eeb38c r4:84fd8500 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:84eeb38c r4:84fd8500 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856b0000 r8:84fd852c r7:82804d40 r6:dddced40 r5:dddced60 r4:84fd8500 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84fd8500 r8:8027ade4 r7:dfe51e60 r6:84da7700 r5:856b0000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfebdfb0 to 0xdfebdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84fd5e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:49:4221 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:49 state:D stack:0 pid:4221 tgid:4221 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3ed30>] (__schedule_loop kernel/sched/core.c:7043 [inline]) [<81a3dd9c>] (__schedule) from [<81a3ed30>] (schedule+0x2c/0x130 kernel/sched/core.c:7058) r10:dfabdd84 r9:00000002 r8:60000013 r7:82916594 r6:dfabdd8c r5:856ac800 r4:856ac800 [<81a3ed04>] (schedule) from [<81a3f118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7115) r5:856ac800 r4:82916590 [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a41978>] (__mutex_lock.constprop.0) from [<81a42470>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfabde08 r4:00000000 [<81a4245c>] (__mutex_lock_slowpath) from [<81a424b0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a42474>] (mutex_lock) from [<804e0660>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84974240 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856ac800 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dfa95000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:8560a78c r4:84fd8a80 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:8560a78c r4:84fd8a80 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856ac800 r8:84fd8aac r7:82804d40 r6:dddced40 r5:dddced60 r4:84fd8a80 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84fd8a80 r8:8027ade4 r7:dff11e60 r6:84fd8b00 r5:856ac800 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfabdfb0 to 0xdfabdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84974040 INFO: task kworker/0:49:4221 is blocked on a mutex likely owned by task kworker/0:39:4180. task:kworker/0:39 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3f164>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7288) r10:8280c9b4 r9:856b0000 r8:80200c04 r7:dfebdd54 r6:ffffffff r5:856b0000 r4:00000000 [<81a3f124>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfebdd20 to 0xdfebdd68) dd20: 83bd2000 ed7dd000 00000001 80239bb8 7f079000 00000001 82ac8f44 82ac8320 dd40: 7f079000 ed7dd000 8280c9b4 dfebdd9c dfebdda0 dfebdd70 80230af0 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e0424>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82ac8f64 [<804e01a0>] (__purge_vmap_area_lazy) from [<804e07dc>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfebddc0 r5:dfebde08 r4:dfebddc0 [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc15c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:df9cf000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:84eeb38c r4:84fd8500 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:84eeb38c r4:84fd8500 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856b0000 r8:84fd852c r7:82804d40 r6:dddced40 r5:dddced60 r4:84fd8500 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84fd8500 r8:8027ade4 r7:dfe51e60 r6:84da7700 r5:856b0000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfebdfb0 to 0xdfebdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84fd5e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:50:4223 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:50 state:D stack:0 pid:4223 tgid:4223 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3ed30>] (__schedule_loop kernel/sched/core.c:7043 [inline]) [<81a3dd9c>] (__schedule) from [<81a3ed30>] (schedule+0x2c/0x130 kernel/sched/core.c:7058) r10:e02b9d84 r9:00000002 r8:60000113 r7:82916594 r6:e02b9d8c r5:856ad400 r4:856ad400 [<81a3ed04>] (schedule) from [<81a3f118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7115) r5:856ad400 r4:82916590 [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a41978>] (__mutex_lock.constprop.0) from [<81a42470>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e02b9e08 r4:00000000 [<81a4245c>] (__mutex_lock_slowpath) from [<81a424b0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a42474>] (mutex_lock) from [<804e0660>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849745c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856ad400 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dfac5000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:8560a38c r4:84fd8b80 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:8560a38c r4:84fd8b80 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856ad400 r8:84fd8bac r7:82804d40 r6:dddced40 r5:dddced60 r4:84fd8b80 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84fd8b80 r8:8027ade4 r7:dff79e60 r6:84fd8c00 r5:856ad400 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe02b9fb0 to 0xe02b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84974200 INFO: task kworker/0:50:4223 is blocked on a mutex likely owned by task kworker/0:39:4180. task:kworker/0:39 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3f164>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7288) r10:8280c9b4 r9:856b0000 r8:80200c04 r7:dfebdd54 r6:ffffffff r5:856b0000 r4:00000000 [<81a3f124>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfebdd20 to 0xdfebdd68) dd20: 83e42000 ed7dd000 00000001 80239bb8 7f079000 00000001 82ac8f44 82ac8320 dd40: 7f079000 ed7dd000 8280c9b4 dfebdd9c dfebdda0 dfebdd70 80230af0 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e0424>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82ac8f64 [<804e01a0>] (__purge_vmap_area_lazy) from [<804e07dc>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfebddc0 r5:dfebde08 r4:dfebddc0 [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc15c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:df9cf000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:84eeb38c r4:84fd8500 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:84eeb38c r4:84fd8500 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856b0000 r8:84fd852c r7:82804d40 r6:dddced40 r5:dddced60 r4:84fd8500 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84fd8500 r8:8027ade4 r7:dfe51e60 r6:84da7700 r5:856b0000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfebdfb0 to 0xdfebdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84fd5e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:51:4226 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:51 state:D stack:0 pid:4226 tgid:4226 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3ed30>] (__schedule_loop kernel/sched/core.c:7043 [inline]) [<81a3dd9c>] (__schedule) from [<81a3ed30>] (schedule+0x2c/0x130 kernel/sched/core.c:7058) r10:dfa9dd84 r9:00000002 r8:60000113 r7:82916594 r6:dfa9dd8c r5:856abc00 r4:856abc00 [<81a3ed04>] (schedule) from [<81a3f118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7115) r5:856abc00 r4:82916590 [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a41978>] (__mutex_lock.constprop.0) from [<81a42470>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa9de08 r4:00000000 [<81a4245c>] (__mutex_lock_slowpath) from [<81a424b0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a42474>] (mutex_lock) from [<804e0660>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84974dc0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856abc00 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dfb29000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:8560bb8c r4:84fd8c80 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:8560bb8c r4:84fd8c80 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856abc00 r8:84fd8cac r7:82804d40 r6:dddced40 r5:dddced60 r4:84fd8c80 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84fd8c80 r8:8027ade4 r7:dff79e60 r6:84fd8d00 r5:856abc00 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa9dfb0 to 0xdfa9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84974780 INFO: task kworker/0:51:4226 is blocked on a mutex likely owned by task kworker/0:39:4180. task:kworker/0:39 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3f164>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7288) r10:8280c9b4 r9:856b0000 r8:80200c04 r7:dfebdd54 r6:ffffffff r5:856b0000 r4:00000000 [<81a3f124>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfebdd20 to 0xdfebdd68) dd20: 83e42000 ed7dd000 00000001 80239bb8 7f079000 00000001 82ac8f44 82ac8320 dd40: 7f079000 ed7dd000 8280c9b4 dfebdd9c dfebdda0 dfebdd70 80230af0 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e0424>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82ac8f64 [<804e01a0>] (__purge_vmap_area_lazy) from [<804e07dc>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfebddc0 r5:dfebde08 r4:dfebddc0 [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc15c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:df9cf000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:84eeb38c r4:84fd8500 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:84eeb38c r4:84fd8500 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856b0000 r8:84fd852c r7:82804d40 r6:dddced40 r5:dddced60 r4:84fd8500 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84fd8500 r8:8027ade4 r7:dfe51e60 r6:84da7700 r5:856b0000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfebdfb0 to 0xdfebdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84fd5e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:52:4227 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:52 state:D stack:0 pid:4227 tgid:4227 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3ed30>] (__schedule_loop kernel/sched/core.c:7043 [inline]) [<81a3dd9c>] (__schedule) from [<81a3ed30>] (schedule+0x2c/0x130 kernel/sched/core.c:7058) r10:e02b1d84 r9:00000002 r8:60000113 r7:82916594 r6:e02b1d8c r5:856ae000 r4:856ae000 [<81a3ed04>] (schedule) from [<81a3f118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7115) r5:856ae000 r4:82916590 [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a41978>] (__mutex_lock.constprop.0) from [<81a42470>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e02b1e08 r4:00000000 [<81a4245c>] (__mutex_lock_slowpath) from [<81a424b0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a42474>] (mutex_lock) from [<804e0660>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849749c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856ae000 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dfaf1000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:8560b38c r4:84fd8d80 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:8560b38c r4:84fd8d80 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856ae000 r8:84fd8dac r7:82804d40 r6:dddced40 r5:dddced60 r4:84fd8d80 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84fd8d80 r8:8027ade4 r7:dfa9de60 r6:84fd8e00 r5:856ae000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe02b1fb0 to 0xe02b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84974540 INFO: task kworker/0:52:4227 is blocked on a mutex likely owned by task kworker/0:39:4180. task:kworker/0:39 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3f164>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7288) r10:8280c9b4 r9:856b0000 r8:80200c04 r7:dfebdd54 r6:ffffffff r5:856b0000 r4:00000000 [<81a3f124>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfebdd20 to 0xdfebdd68) dd20: 8402a000 ed7dd000 00000001 80239bb8 7f079000 00000001 82ac8f44 82ac8320 dd40: 7f079000 ed7dd000 8280c9b4 dfebdd9c dfebdda0 dfebdd70 80230af0 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e0424>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82ac8f64 [<804e01a0>] (__purge_vmap_area_lazy) from [<804e07dc>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfebddc0 r5:dfebde08 r4:dfebddc0 [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc15c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:df9cf000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:84eeb38c r4:84fd8500 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:84eeb38c r4:84fd8500 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856b0000 r8:84fd852c r7:82804d40 r6:dddced40 r5:dddced60 r4:84fd8500 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84fd8500 r8:8027ade4 r7:dfe51e60 r6:84da7700 r5:856b0000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfebdfb0 to 0xdfebdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84fd5e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:53:4230 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:53 state:D stack:0 pid:4230 tgid:4230 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3ed30>] (__schedule_loop kernel/sched/core.c:7043 [inline]) [<81a3dd9c>] (__schedule) from [<81a3ed30>] (schedule+0x2c/0x130 kernel/sched/core.c:7058) r10:dfb09d84 r9:00000002 r8:60000113 r7:82916594 r6:dfb09d8c r5:83ac6c00 r4:83ac6c00 [<81a3ed04>] (schedule) from [<81a3f118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7115) r5:83ac6c00 r4:82916590 [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a41978>] (__mutex_lock.constprop.0) from [<81a42470>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb09e08 r4:00000000 [<81a4245c>] (__mutex_lock_slowpath) from [<81a424b0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a42474>] (mutex_lock) from [<804e0660>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84974c80 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:83ac6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dfb17000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:8560b78c r4:84fd8e80 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:8560b78c r4:84fd8e80 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83ac6c00 r8:84fd8eac r7:82804d40 r6:dddced40 r5:dddced60 r4:84fd8e80 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84fd8e80 r8:8027ade4 r7:dfa9de60 r6:84fd8f00 r5:83ac6c00 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb09fb0 to 0xdfb09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84974940 INFO: task kworker/0:53:4230 is blocked on a mutex likely owned by task kworker/0:39:4180. task:kworker/0:39 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3f164>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7288) r10:8280c9b4 r9:856b0000 r8:80200c04 r7:dfebdd54 r6:ffffffff r5:856b0000 r4:00000000 [<81a3f124>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfebdd20 to 0xdfebdd68) dd20: 8402a000 ed7dd000 00000001 80239bb8 7f079000 00000001 82ac8f44 82ac8320 dd40: 7f079000 ed7dd000 8280c9b4 dfebdd9c dfebdda0 dfebdd70 80230af0 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e0424>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82ac8f64 [<804e01a0>] (__purge_vmap_area_lazy) from [<804e07dc>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfebddc0 r5:dfebde08 r4:dfebddc0 [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc15c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:df9cf000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:84eeb38c r4:84fd8500 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:84eeb38c r4:84fd8500 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856b0000 r8:84fd852c r7:82804d40 r6:dddced40 r5:dddced60 r4:84fd8500 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84fd8500 r8:8027ade4 r7:dfe51e60 r6:84da7700 r5:856b0000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfebdfb0 to 0xdfebdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84fd5e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:54:4231 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:54 state:D stack:0 pid:4231 tgid:4231 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3ed30>] (__schedule_loop kernel/sched/core.c:7043 [inline]) [<81a3dd9c>] (__schedule) from [<81a3ed30>] (schedule+0x2c/0x130 kernel/sched/core.c:7058) r10:dfb0dd84 r9:00000002 r8:60000113 r7:82916594 r6:dfb0dd8c r5:856aa400 r4:856aa400 [<81a3ed04>] (schedule) from [<81a3f118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7115) r5:856aa400 r4:82916590 [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a41978>] (__mutex_lock.constprop.0) from [<81a42470>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb0de08 r4:00000000 [<81a4245c>] (__mutex_lock_slowpath) from [<81a424b0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a42474>] (mutex_lock) from [<804e0660>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f2e540 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856aa400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dfb47000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:8560bf8c r4:84fd8f80 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:8560bf8c r4:84fd8f80 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856aa400 r8:84fd8fac r7:82804d40 r6:dddced40 r5:dddced60 r4:84fd8f80 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84fd8f80 r8:8027ade4 r7:dfa9de60 r6:84825a00 r5:856aa400 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb0dfb0 to 0xdfb0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84974900 INFO: task kworker/0:54:4231 is blocked on a mutex likely owned by task kworker/0:39:4180. task:kworker/0:39 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3f164>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7288) r10:8280c9b4 r9:856b0000 r8:80200c04 r7:dfebdd54 r6:ffffffff r5:856b0000 r4:00000000 [<81a3f124>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfebdd20 to 0xdfebdd68) dd20: 84129000 ed7dd000 00000001 80239bb8 7f079000 00000001 82ac8f44 82ac8320 dd40: 7f079000 ed7dd000 8280c9b4 dfebdd9c dfebdda0 dfebdd70 80230af0 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e0424>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82ac8f64 [<804e01a0>] (__purge_vmap_area_lazy) from [<804e07dc>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfebddc0 r5:dfebde08 r4:dfebddc0 [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc15c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:df9cf000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:84eeb38c r4:84fd8500 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:84eeb38c r4:84fd8500 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856b0000 r8:84fd852c r7:82804d40 r6:dddced40 r5:dddced60 r4:84fd8500 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84fd8500 r8:8027ade4 r7:dfe51e60 r6:84da7700 r5:856b0000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfebdfb0 to 0xdfebdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84fd5e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:55:4234 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:55 state:D stack:0 pid:4234 tgid:4234 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3ed30>] (__schedule_loop kernel/sched/core.c:7043 [inline]) [<81a3dd9c>] (__schedule) from [<81a3ed30>] (schedule+0x2c/0x130 kernel/sched/core.c:7058) r10:dfb39d84 r9:00000002 r8:60000113 r7:82916594 r6:dfb39d8c r5:856c0000 r4:856c0000 [<81a3ed04>] (schedule) from [<81a3f118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7115) r5:856c0000 r4:82916590 [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a41978>] (__mutex_lock.constprop.0) from [<81a42470>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb39e08 r4:00000000 [<81a4245c>] (__mutex_lock_slowpath) from [<81a424b0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a42474>] (mutex_lock) from [<804e0660>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8563cd80 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856c0000 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dfc15000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:8561438c r4:8547f000 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:8561438c r4:8547f000 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856c0000 r8:8547f02c r7:82804d40 r6:dddced40 r5:dddced60 r4:8547f000 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8547f000 r8:8027ade4 r7:dfb0de60 r6:8547f100 r5:856c0000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb39fb0 to 0xdfb39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84974f80 INFO: task kworker/0:55:4234 is blocked on a mutex likely owned by task kworker/0:39:4180. task:kworker/0:39 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3f164>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7288) r10:8280c9b4 r9:856b0000 r8:80200c04 r7:dfebdd54 r6:ffffffff r5:856b0000 r4:00000000 [<81a3f124>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfebdd20 to 0xdfebdd68) dd20: 843e5000 ed7dd000 00000001 80239bb8 7f079000 00000001 82ac8f44 82ac8320 dd40: 7f079000 ed7dd000 8280c9b4 dfebdd9c dfebdda0 dfebdd70 80230af0 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e0424>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82ac8f64 [<804e01a0>] (__purge_vmap_area_lazy) from [<804e07dc>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfebddc0 r5:dfebde08 r4:dfebddc0 [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc15c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:df9cf000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:84eeb38c r4:84fd8500 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:84eeb38c r4:84fd8500 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856b0000 r8:84fd852c r7:82804d40 r6:dddced40 r5:dddced60 r4:84fd8500 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84fd8500 r8:8027ade4 r7:dfe51e60 r6:84da7700 r5:856b0000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfebdfb0 to 0xdfebdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84fd5e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:56:4235 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:56 state:D stack:0 pid:4235 tgid:4235 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3ed30>] (__schedule_loop kernel/sched/core.c:7043 [inline]) [<81a3dd9c>] (__schedule) from [<81a3ed30>] (schedule+0x2c/0x130 kernel/sched/core.c:7058) r10:dfb3dd84 r9:00000002 r8:60000113 r7:82916594 r6:dfb3dd8c r5:856c0c00 r4:856c0c00 [<81a3ed04>] (schedule) from [<81a3f118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7115) r5:856c0c00 r4:82916590 [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a41978>] (__mutex_lock.constprop.0) from [<81a42470>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb3de08 r4:00000000 [<81a4245c>] (__mutex_lock_slowpath) from [<81a424b0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a42474>] (mutex_lock) from [<804e0660>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f2ea40 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856c0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dfb67000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:85609f8c r4:8547f180 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:85609f8c r4:8547f180 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856c0c00 r8:8547f1ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8547f180 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8547f180 r8:8027ade4 r7:dfb39e60 r6:8547f200 r5:856c0c00 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb3dfb0 to 0xdfb3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84974d80 INFO: task kworker/0:56:4235 is blocked on a mutex likely owned by task kworker/0:39:4180. task:kworker/0:39 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3f164>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7288) r10:8280c9b4 r9:856b0000 r8:80200c04 r7:dfebdd54 r6:ffffffff r5:856b0000 r4:00000000 [<81a3f124>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfebdd20 to 0xdfebdd68) dd20: 843e5000 ed7dd000 00000001 80239bb8 7f079000 00000001 82ac8f44 82ac8320 dd40: 7f079000 ed7dd000 8280c9b4 dfebdd9c dfebdda0 dfebdd70 80230af0 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e0424>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82ac8f64 [<804e01a0>] (__purge_vmap_area_lazy) from [<804e07dc>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfebddc0 r5:dfebde08 r4:dfebddc0 [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc15c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:df9cf000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:84eeb38c r4:84fd8500 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:84eeb38c r4:84fd8500 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856b0000 r8:84fd852c r7:82804d40 r6:dddced40 r5:dddced60 r4:84fd8500 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84fd8500 r8:8027ade4 r7:dfe51e60 r6:84da7700 r5:856b0000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfebdfb0 to 0xdfebdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84fd5e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:57:4238 blocked for more than 431 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:57 state:D stack:0 pid:4238 tgid:4238 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3ed30>] (__schedule_loop kernel/sched/core.c:7043 [inline]) [<81a3dd9c>] (__schedule) from [<81a3ed30>] (schedule+0x2c/0x130 kernel/sched/core.c:7058) r10:dfb95d84 r9:00000002 r8:60000013 r7:82916594 r6:dfb95d8c r5:856c2400 r4:856c2400 [<81a3ed04>] (schedule) from [<81a3f118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7115) r5:856c2400 r4:82916590 [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a41978>] (__mutex_lock.constprop.0) from [<81a42470>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb95e08 r4:00000000 [<81a4245c>] (__mutex_lock_slowpath) from [<81a424b0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a42474>] (mutex_lock) from [<804e0660>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f22c80 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856c2400 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dfb85000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:8560978c r4:8547f380 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:8560978c r4:8547f380 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856c2400 r8:8547f3ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8547f380 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8547f380 r8:8027ade4 r7:dfb39e60 r6:8547f400 r5:856c2400 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb95fb0 to 0xdfb95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:8563c000 INFO: task kworker/0:57:4238 is blocked on a mutex likely owned by task kworker/0:39:4180. task:kworker/0:39 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3f164>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7288) r10:8280c9b4 r9:856b0000 r8:80200c04 r7:dfebdd54 r6:ffffffff r5:856b0000 r4:00000000 [<81a3f124>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfebdd20 to 0xdfebdd68) dd20: 848ee000 ed7dd000 00000001 80239bb8 7f079000 00000001 82ac8f44 82ac8320 dd40: 7f079000 ed7dd000 8280c9b4 dfebdd9c dfebdda0 dfebdd70 80230af0 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e0424>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82ac8f64 [<804e01a0>] (__purge_vmap_area_lazy) from [<804e07dc>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfebddc0 r5:dfebde08 r4:dfebddc0 [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc15c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:df9cf000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:84eeb38c r4:84fd8500 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:84eeb38c r4:84fd8500 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856b0000 r8:84fd852c r7:82804d40 r6:dddced40 r5:dddced60 r4:84fd8500 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84fd8500 r8:8027ade4 r7:dfe51e60 r6:84da7700 r5:856b0000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfebdfb0 to 0xdfebdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84fd5e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:58:4239 blocked for more than 431 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:58 state:D stack:0 pid:4239 tgid:4239 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3ed30>] (__schedule_loop kernel/sched/core.c:7043 [inline]) [<81a3dd9c>] (__schedule) from [<81a3ed30>] (schedule+0x2c/0x130 kernel/sched/core.c:7058) r10:dfb65d84 r9:00000002 r8:60000013 r7:82916594 r6:dfb65d8c r5:856c3000 r4:856c3000 [<81a3ed04>] (schedule) from [<81a3f118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7115) r5:856c3000 r4:82916590 [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a41978>] (__mutex_lock.constprop.0) from [<81a42470>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb65e08 r4:00000000 [<81a4245c>] (__mutex_lock_slowpath) from [<81a424b0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a42474>] (mutex_lock) from [<804e0660>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8563c300 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856c3000 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dfb97000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:8568738c r4:8547f300 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:8568738c r4:8547f300 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856c3000 r8:8547f32c r7:82804d40 r6:dddced40 r5:dddced60 r4:8547f300 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8547f300 r8:8027ade4 r7:dfb39e60 r6:8547f280 r5:856c3000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb65fb0 to 0xdfb65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:8563c000 INFO: task kworker/0:58:4239 is blocked on a mutex likely owned by task kworker/0:39:4180. task:kworker/0:39 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3f164>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7288) r10:8280c9b4 r9:856b0000 r8:80200c04 r7:dfebdd54 r6:ffffffff r5:856b0000 r4:00000000 [<81a3f124>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfebdd20 to 0xdfebdd68) dd20: 848ee000 ed7dd000 00000001 80239bb8 7f079000 00000001 82ac8f44 82ac8320 dd40: 7f079000 ed7dd000 8280c9b4 dfebdd9c dfebdda0 dfebdd70 80230af0 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e0424>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82ac8f64 [<804e01a0>] (__purge_vmap_area_lazy) from [<804e07dc>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfebddc0 r5:dfebde08 r4:dfebddc0 [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc15c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:df9cf000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:84eeb38c r4:84fd8500 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:84eeb38c r4:84fd8500 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856b0000 r8:84fd852c r7:82804d40 r6:dddced40 r5:dddced60 r4:84fd8500 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84fd8500 r8:8027ade4 r7:dfe51e60 r6:84da7700 r5:856b0000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfebdfb0 to 0xdfebdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84fd5e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:59:4242 blocked for more than 431 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:59 state:D stack:0 pid:4242 tgid:4242 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3ed30>] (__schedule_loop kernel/sched/core.c:7043 [inline]) [<81a3dd9c>] (__schedule) from [<81a3ed30>] (schedule+0x2c/0x130 kernel/sched/core.c:7058) r10:dfb7dd84 r9:00000002 r8:60000013 r7:82916594 r6:dfb7dd8c r5:856c3c00 r4:856c3c00 [<81a3ed04>] (schedule) from [<81a3f118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7115) r5:856c3c00 r4:82916590 [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a41978>] (__mutex_lock.constprop.0) from [<81a42470>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb7de08 r4:00000000 [<81a4245c>] (__mutex_lock_slowpath) from [<81a424b0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a42474>] (mutex_lock) from [<804e0660>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8563c540 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856c3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dfbad000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:8560938c r4:8547f480 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:8560938c r4:8547f480 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856c3c00 r8:8547f4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8547f480 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8547f480 r8:8027ade4 r7:dfb39e60 r6:8547f500 r5:856c3c00 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb7dfb0 to 0xdfb7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:8563c500 INFO: task kworker/0:59:4242 is blocked on a mutex likely owned by task kworker/0:39:4180. task:kworker/0:39 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3f164>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7288) r10:8280c9b4 r9:856b0000 r8:80200c04 r7:dfebdd54 r6:ffffffff r5:856b0000 r4:00000000 [<81a3f124>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfebdd20 to 0xdfebdd68) dd20: 84e80000 ed7dd000 00000001 80239bb8 7f079000 00000001 82ac8f44 82ac8320 dd40: 7f079000 ed7dd000 8280c9b4 dfebdd9c dfebdda0 dfebdd70 80230af0 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e0424>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82ac8f64 [<804e01a0>] (__purge_vmap_area_lazy) from [<804e07dc>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfebddc0 r5:dfebde08 r4:dfebddc0 [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc15c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:df9cf000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:84eeb38c r4:84fd8500 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:84eeb38c r4:84fd8500 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856b0000 r8:84fd852c r7:82804d40 r6:dddced40 r5:dddced60 r4:84fd8500 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84fd8500 r8:8027ade4 r7:dfe51e60 r6:84da7700 r5:856b0000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfebdfb0 to 0xdfebdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84fd5e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:60:4244 blocked for more than 431 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:60 state:D stack:0 pid:4244 tgid:4244 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3ed30>] (__schedule_loop kernel/sched/core.c:7043 [inline]) [<81a3dd9c>] (__schedule) from [<81a3ed30>] (schedule+0x2c/0x130 kernel/sched/core.c:7058) r10:dfb9dd84 r9:00000002 r8:60000013 r7:82916594 r6:dfb9dd8c r5:856c4800 r4:856c4800 [<81a3ed04>] (schedule) from [<81a3f118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7115) r5:856c4800 r4:82916590 [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a41978>] (__mutex_lock.constprop.0) from [<81a42470>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb9de08 r4:00000000 [<81a4245c>] (__mutex_lock_slowpath) from [<81a424b0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a42474>] (mutex_lock) from [<804e0660>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8563c6c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856c4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dfbc7000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:8560878c r4:8547f580 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:8560878c r4:8547f580 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856c4800 r8:8547f5ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8547f580 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8547f580 r8:8027ade4 r7:dfb39e60 r6:8547f600 r5:856c4800 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb9dfb0 to 0xdfb9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:8563c440 INFO: task kworker/0:60:4244 is blocked on a mutex likely owned by task kworker/0:39:4180. task:kworker/0:39 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3f164>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7288) r10:8280c9b4 r9:856b0000 r8:80200c04 r7:dfebdd54 r6:ffffffff r5:856b0000 r4:00000000 [<81a3f124>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfebdd20 to 0xdfebdd68) dd20: 84e80000 ed7dd000 00000001 80239bb8 7f079000 00000001 82ac8f44 82ac8320 dd40: 7f079000 ed7dd000 8280c9b4 dfebdd9c dfebdda0 dfebdd70 80230af0 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e0424>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82ac8f64 [<804e01a0>] (__purge_vmap_area_lazy) from [<804e07dc>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfebddc0 r5:dfebde08 r4:dfebddc0 [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc15c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:df9cf000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:84eeb38c r4:84fd8500 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:84eeb38c r4:84fd8500 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856b0000 r8:84fd852c r7:82804d40 r6:dddced40 r5:dddced60 r4:84fd8500 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84fd8500 r8:8027ade4 r7:dfe51e60 r6:84da7700 r5:856b0000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfebdfb0 to 0xdfebdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84fd5e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:61:4246 blocked for more than 431 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:61 state:D stack:0 pid:4246 tgid:4246 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3ed30>] (__schedule_loop kernel/sched/core.c:7043 [inline]) [<81a3dd9c>] (__schedule) from [<81a3ed30>] (schedule+0x2c/0x130 kernel/sched/core.c:7058) r10:dfbddd84 r9:00000002 r8:60000013 r7:82916594 r6:dfbddd8c r5:856c5400 r4:856c5400 [<81a3ed04>] (schedule) from [<81a3f118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7115) r5:856c5400 r4:82916590 [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a41978>] (__mutex_lock.constprop.0) from [<81a42470>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbdde08 r4:00000000 [<81a4245c>] (__mutex_lock_slowpath) from [<81a424b0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a42474>] (mutex_lock) from [<804e0660>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8563c980 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856c5400 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dfbdf000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:84fee38c r4:8547f680 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:84fee38c r4:8547f680 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856c5400 r8:8547f6ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8547f680 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8547f680 r8:8027ade4 r7:dfb39e60 r6:8547f700 r5:856c5400 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbddfb0 to 0xdfbddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:8563c940 INFO: task kworker/0:61:4246 is blocked on a mutex likely owned by task kworker/0:39:4180. task:kworker/0:39 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3f164>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7288) r10:8280c9b4 r9:856b0000 r8:80200c04 r7:dfebdd54 r6:ffffffff r5:856b0000 r4:00000000 [<81a3f124>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfebdd20 to 0xdfebdd68) dd20: 84ff6000 ed7dd000 00000001 80239bb8 7f079000 00000001 82ac8f44 82ac8320 dd40: 7f079000 ed7dd000 8280c9b4 dfebdd9c dfebdda0 dfebdd70 80230af0 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e0424>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82ac8f64 [<804e01a0>] (__purge_vmap_area_lazy) from [<804e07dc>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfebddc0 r5:dfebde08 r4:dfebddc0 [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc15c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:df9cf000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:84eeb38c r4:84fd8500 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:84eeb38c r4:84fd8500 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856b0000 r8:84fd852c r7:82804d40 r6:dddced40 r5:dddced60 r4:84fd8500 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84fd8500 r8:8027ade4 r7:dfe51e60 r6:84da7700 r5:856b0000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfebdfb0 to 0xdfebdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84fd5e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:62:4248 blocked for more than 431 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:62 state:D stack:0 pid:4248 tgid:4248 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3ed30>] (__schedule_loop kernel/sched/core.c:7043 [inline]) [<81a3dd9c>] (__schedule) from [<81a3ed30>] (schedule+0x2c/0x130 kernel/sched/core.c:7058) r10:dfbc5d84 r9:00000002 r8:60000013 r7:82916594 r6:dfbc5d8c r5:856c1800 r4:856c1800 [<81a3ed04>] (schedule) from [<81a3f118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7115) r5:856c1800 r4:82916590 [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a41978>] (__mutex_lock.constprop.0) from [<81a42470>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbc5e08 r4:00000000 [<81a4245c>] (__mutex_lock_slowpath) from [<81a424b0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a42474>] (mutex_lock) from [<804e0660>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8563cac0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856c1800 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dfbfd000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:855fc78c r4:8547f800 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:855fc78c r4:8547f800 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856c1800 r8:8547f82c r7:82804d40 r6:dddced40 r5:dddced60 r4:8547f800 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8547f800 r8:8027ade4 r7:dfb39e60 r6:8547f880 r5:856c1800 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbc5fb0 to 0xdfbc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:8563c4c0 INFO: task kworker/0:62:4248 is blocked on a mutex likely owned by task kworker/0:39:4180. task:kworker/0:39 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3f164>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7288) r10:8280c9b4 r9:856b0000 r8:80200c04 r7:dfebdd54 r6:ffffffff r5:856b0000 r4:00000000 [<81a3f124>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfebdd20 to 0xdfebdd68) dd20: 84ff6000 ed7dd000 00000001 80239bb8 7f079000 00000001 82ac8f44 82ac8320 dd40: 7f079000 ed7dd000 8280c9b4 dfebdd9c dfebdda0 dfebdd70 80230af0 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e0424>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82ac8f64 [<804e01a0>] (__purge_vmap_area_lazy) from [<804e07dc>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfebddc0 r5:dfebde08 r4:dfebddc0 [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc15c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:df9cf000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:84eeb38c r4:84fd8500 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:84eeb38c r4:84fd8500 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856b0000 r8:84fd852c r7:82804d40 r6:dddced40 r5:dddced60 r4:84fd8500 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84fd8500 r8:8027ade4 r7:dfe51e60 r6:84da7700 r5:856b0000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfebdfb0 to 0xdfebdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84fd5e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:63:4250 blocked for more than 431 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:63 state:D stack:0 pid:4250 tgid:4250 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3ed30>] (__schedule_loop kernel/sched/core.c:7043 [inline]) [<81a3dd9c>] (__schedule) from [<81a3ed30>] (schedule+0x2c/0x130 kernel/sched/core.c:7058) r10:dfbf9d84 r9:00000002 r8:60000113 r7:82916594 r6:dfbf9d8c r5:856c6c00 r4:856c6c00 [<81a3ed04>] (schedule) from [<81a3f118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7115) r5:856c6c00 r4:82916590 [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a41978>] (__mutex_lock.constprop.0) from [<81a42470>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbf9e08 r4:00000000 [<81a4245c>] (__mutex_lock_slowpath) from [<81a424b0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a42474>] (mutex_lock) from [<804e0660>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8563cf40 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856c6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dfc23000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:8561478c r4:8547fa00 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:8561478c r4:8547fa00 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856c6c00 r8:8547fa2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8547fa00 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8547fa00 r8:8027ade4 r7:dfb39e60 r6:8547f980 r5:856c6c00 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbf9fb0 to 0xdfbf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:8563cc80 INFO: task kworker/0:63:4250 is blocked on a mutex likely owned by task kworker/0:39:4180. task:kworker/0:39 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3f164>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7288) r10:8280c9b4 r9:856b0000 r8:80200c04 r7:dfebdd54 r6:ffffffff r5:856b0000 r4:00000000 [<81a3f124>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfebdd20 to 0xdfebdd68) dd20: 853c4000 ed7dd000 00000001 80239bb8 7f079000 00000001 82ac8f44 82ac8320 dd40: 7f079000 ed7dd000 8280c9b4 dfebdd9c dfebdda0 dfebdd70 80230af0 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e0424>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82ac8f64 [<804e01a0>] (__purge_vmap_area_lazy) from [<804e07dc>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfebddc0 r5:dfebde08 r4:dfebddc0 [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc15c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:df9cf000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:84eeb38c r4:84fd8500 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:84eeb38c r4:84fd8500 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856b0000 r8:84fd852c r7:82804d40 r6:dddced40 r5:dddced60 r4:84fd8500 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84fd8500 r8:8027ade4 r7:dfe51e60 r6:84da7700 r5:856b0000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfebdfb0 to 0xdfebdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84fd5e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:64:4251 blocked for more than 431 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:64 state:D stack:0 pid:4251 tgid:4251 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3ed30>] (__schedule_loop kernel/sched/core.c:7043 [inline]) [<81a3dd9c>] (__schedule) from [<81a3ed30>] (schedule+0x2c/0x130 kernel/sched/core.c:7058) r10:dfbf5d84 r9:00000002 r8:60000013 r7:82916594 r6:dfbf5d8c r5:83aab000 r4:83aab000 [<81a3ed04>] (schedule) from [<81a3f118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7115) r5:83aab000 r4:82916590 [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a41978>] (__mutex_lock.constprop.0) from [<81a42470>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbf5e08 r4:00000000 [<81a4245c>] (__mutex_lock_slowpath) from [<81a424b0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a42474>] (mutex_lock) from [<804e0660>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8563d700 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:83aab000 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dfcaf000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:85615b8c r4:8547fa80 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:85615b8c r4:8547fa80 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83aab000 r8:8547faac r7:82804d40 r6:dddced40 r5:dddced60 r4:8547fa80 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8547fa80 r8:8027ade4 r7:dfbf9e60 r6:8547fb00 r5:83aab000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbf5fb0 to 0xdfbf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:8563ca80 INFO: task kworker/0:64:4251 is blocked on a mutex likely owned by task kworker/0:39:4180. task:kworker/0:39 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3f164>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7288) r10:8280c9b4 r9:856b0000 r8:80200c04 r7:dfebdd54 r6:ffffffff r5:856b0000 r4:00000000 [<81a3f124>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfebdd20 to 0xdfebdd68) dd20: 85676000 ed7dd000 00000001 80239bb8 7f079000 00000001 82ac8f44 82ac8320 dd40: 7f079000 ed7dd000 8280c9b4 dfebdd9c dfebdda0 dfebdd70 80230af0 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e0424>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82ac8f64 [<804e01a0>] (__purge_vmap_area_lazy) from [<804e07dc>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfebddc0 r5:dfebde08 r4:dfebddc0 [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc15c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:df9cf000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:84eeb38c r4:84fd8500 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:84eeb38c r4:84fd8500 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856b0000 r8:84fd852c r7:82804d40 r6:dddced40 r5:dddced60 r4:84fd8500 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84fd8500 r8:8027ade4 r7:dfe51e60 r6:84da7700 r5:856b0000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfebdfb0 to 0xdfebdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84fd5e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:65:4254 blocked for more than 431 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:65 state:D stack:0 pid:4254 tgid:4254 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3ed30>] (__schedule_loop kernel/sched/core.c:7043 [inline]) [<81a3dd9c>] (__schedule) from [<81a3ed30>] (schedule+0x2c/0x130 kernel/sched/core.c:7058) r10:dfc75d84 r9:00000002 r8:60000113 r7:82916594 r6:dfc75d8c r5:856c8000 r4:856c8000 [<81a3ed04>] (schedule) from [<81a3f118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7115) r5:856c8000 r4:82916590 [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a41978>] (__mutex_lock.constprop.0) from [<81a42470>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc75e08 r4:00000000 [<81a4245c>] (__mutex_lock_slowpath) from [<81a424b0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a42474>] (mutex_lock) from [<804e0660>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc0480 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856c8000 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dfc3d000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:85614b8c r4:8547fb80 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:85614b8c r4:8547fb80 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856c8000 r8:8547fbac r7:82804d40 r6:dddced40 r5:dddced60 r4:8547fb80 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8547fb80 r8:8027ade4 r7:dfbf5e60 r6:8547fc80 r5:856c8000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc75fb0 to 0xdfc75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84fd5200 INFO: task kworker/0:65:4254 is blocked on a mutex likely owned by task kworker/0:39:4180. task:kworker/0:39 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3f164>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7288) r10:8280c9b4 r9:856b0000 r8:80200c04 r7:dfebdd54 r6:ffffffff r5:856b0000 r4:00000000 [<81a3f124>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfebdd20 to 0xdfebdd68) dd20: 85676000 ed7dd000 00000001 80239bb8 7f079000 00000001 82ac8f44 82ac8320 dd40: 7f079000 ed7dd000 8280c9b4 dfebdd9c dfebdda0 dfebdd70 80230af0 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e0424>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82ac8f64 [<804e01a0>] (__purge_vmap_area_lazy) from [<804e07dc>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfebddc0 r5:dfebde08 r4:dfebddc0 [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc15c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:df9cf000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:84eeb38c r4:84fd8500 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:84eeb38c r4:84fd8500 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856b0000 r8:84fd852c r7:82804d40 r6:dddced40 r5:dddced60 r4:84fd8500 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84fd8500 r8:8027ade4 r7:dfe51e60 r6:84da7700 r5:856b0000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfebdfb0 to 0xdfebdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84fd5e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:66:4255 blocked for more than 431 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:66 state:D stack:0 pid:4255 tgid:4255 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3ed30>] (__schedule_loop kernel/sched/core.c:7043 [inline]) [<81a3dd9c>] (__schedule) from [<81a3ed30>] (schedule+0x2c/0x130 kernel/sched/core.c:7058) r10:dfc35d84 r9:00000002 r8:60000113 r7:82916594 r6:dfc35d8c r5:856c8c00 r4:856c8c00 [<81a3ed04>] (schedule) from [<81a3f118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7115) r5:856c8c00 r4:82916590 [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a41978>] (__mutex_lock.constprop.0) from [<81a42470>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc35e08 r4:00000000 [<81a4245c>] (__mutex_lock_slowpath) from [<81a424b0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a42474>] (mutex_lock) from [<804e0660>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8563da80 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856c8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dfcdb000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:85615f8c r4:8547fd00 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:85615f8c r4:8547fd00 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856c8c00 r8:8547fd2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8547fd00 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8547fd00 r8:8027ade4 r7:dfbf5e60 r6:8547fd80 r5:856c8c00 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc35fb0 to 0xdfc35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:85634b40 INFO: task kworker/0:66:4255 is blocked on a mutex likely owned by task kworker/0:39:4180. task:kworker/0:39 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3f164>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7288) r10:8280c9b4 r9:856b0000 r8:80200c04 r7:dfebdd54 r6:ffffffff r5:856b0000 r4:00000000 [<81a3f124>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfebdd20 to 0xdfebdd68) dd20: 85676000 ed7dd000 00000001 80239bb8 7f079000 00000001 82ac8f44 82ac8320 dd40: 7f079000 ed7dd000 8280c9b4 dfebdd9c dfebdda0 dfebdd70 80230af0 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e0424>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82ac8f64 [<804e01a0>] (__purge_vmap_area_lazy) from [<804e07dc>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfebddc0 r5:dfebde08 r4:dfebddc0 [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc15c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:df9cf000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:84eeb38c r4:84fd8500 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:84eeb38c r4:84fd8500 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856b0000 r8:84fd852c r7:82804d40 r6:dddced40 r5:dddced60 r4:84fd8500 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84fd8500 r8:8027ade4 r7:dfe51e60 r6:84da7700 r5:856b0000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfebdfb0 to 0xdfebdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84fd5e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:67:4258 blocked for more than 431 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:67 state:D stack:0 pid:4258 tgid:4258 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3ed30>] (__schedule_loop kernel/sched/core.c:7043 [inline]) [<81a3dd9c>] (__schedule) from [<81a3ed30>] (schedule+0x2c/0x130 kernel/sched/core.c:7058) r10:dfca5d84 r9:00000002 r8:60000013 r7:82916594 r6:dfca5d8c r5:856ca400 r4:856ca400 [<81a3ed04>] (schedule) from [<81a3f118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7115) r5:856ca400 r4:82916590 [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a41978>] (__mutex_lock.constprop.0) from [<81a42470>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfca5e08 r4:00000000 [<81a4245c>] (__mutex_lock_slowpath) from [<81a424b0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a42474>] (mutex_lock) from [<804e0660>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8563d180 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856ca400 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dfc6d000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:8561538c r4:8547fe00 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:8561538c r4:8547fe00 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856ca400 r8:8547fe2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8547fe00 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8547fe00 r8:8027ade4 r7:dfbf5e60 r6:8547fe80 r5:856ca400 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfca5fb0 to 0xdfca5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:8563cf00 INFO: task kworker/0:67:4258 is blocked on a mutex likely owned by task kworker/0:39:4180. task:kworker/0:39 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3f164>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7288) r10:8280c9b4 r9:856b0000 r8:80200c04 r7:dfebdd54 r6:ffffffff r5:856b0000 r4:00000000 [<81a3f124>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfebdd20 to 0xdfebdd68) dd20: 85aae000 ed7dd000 00000001 80239bb8 7f079000 00000001 82ac8f44 82ac8320 dd40: 7f079000 ed7dd000 8280c9b4 dfebdd9c dfebdda0 dfebdd70 80230af0 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e0424>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82ac8f64 [<804e01a0>] (__purge_vmap_area_lazy) from [<804e07dc>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfebddc0 r5:dfebde08 r4:dfebddc0 [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc15c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:df9cf000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:84eeb38c r4:84fd8500 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:84eeb38c r4:84fd8500 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856b0000 r8:84fd852c r7:82804d40 r6:dddced40 r5:dddced60 r4:84fd8500 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84fd8500 r8:8027ade4 r7:dfe51e60 r6:84da7700 r5:856b0000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfebdfb0 to 0xdfebdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84fd5e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:59:4261 blocked for more than 431 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:59 state:D stack:0 pid:4261 tgid:4261 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3ed30>] (__schedule_loop kernel/sched/core.c:7043 [inline]) [<81a3dd9c>] (__schedule) from [<81a3ed30>] (schedule+0x2c/0x130 kernel/sched/core.c:7058) r10:dfd09d84 r9:00000002 r8:60000013 r7:82916594 r6:dfd09d8c r5:856cbc00 r4:856cbc00 [<81a3ed04>] (schedule) from [<81a3f118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7115) r5:856cbc00 r4:82916590 [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a41978>] (__mutex_lock.constprop.0) from [<81a42470>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd09e08 r4:00000000 [<81a4245c>] (__mutex_lock_slowpath) from [<81a424b0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a42474>] (mutex_lock) from [<804e0660>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85648740 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018205 r8:856cbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dfa9f000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:85684f8c r4:85639800 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:ddde2d40 r6:83018200 r5:85684f8c r4:85639800 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856cbc00 r8:8563982c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85639800 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85639800 r8:8027ade4 r7:dfab1e60 r6:8547ff80 r5:856cbc00 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd09fb0 to 0xdfd09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:85638380 INFO: task kworker/1:59:4261 is blocked on a mutex likely owned by task kworker/0:39:4180. task:kworker/0:39 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3f164>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7288) r10:8280c9b4 r9:856b0000 r8:80200c04 r7:dfebdd54 r6:ffffffff r5:856b0000 r4:00000000 [<81a3f124>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfebdd20 to 0xdfebdd68) dd20: 85cd0000 ed7dd000 00000001 80239bb8 7f079000 00000001 82ac8f44 82ac8320 dd40: 7f079000 ed7dd000 8280c9b4 dfebdd9c dfebdda0 dfebdd70 80230af0 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e0424>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82ac8f64 [<804e01a0>] (__purge_vmap_area_lazy) from [<804e07dc>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfebddc0 r5:dfebde08 r4:dfebddc0 [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc15c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:df9cf000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:84eeb38c r4:84fd8500 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:84eeb38c r4:84fd8500 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856b0000 r8:84fd852c r7:82804d40 r6:dddced40 r5:dddced60 r4:84fd8500 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84fd8500 r8:8027ade4 r7:dfe51e60 r6:84da7700 r5:856b0000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfebdfb0 to 0xdfebdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84fd5e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:68:4262 blocked for more than 431 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:68 state:D stack:0 pid:4262 tgid:4262 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3ed30>] (__schedule_loop kernel/sched/core.c:7043 [inline]) [<81a3dd9c>] (__schedule) from [<81a3ed30>] (schedule+0x2c/0x130 kernel/sched/core.c:7058) r10:dfc31d84 r9:00000002 r8:60000013 r7:82916594 r6:dfc31d8c r5:856cc800 r4:856cc800 [<81a3ed04>] (schedule) from [<81a3f118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7115) r5:856cc800 r4:82916590 [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a41978>] (__mutex_lock.constprop.0) from [<81a42470>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc31e08 r4:00000000 [<81a4245c>] (__mutex_lock_slowpath) from [<81a424b0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a42474>] (mutex_lock) from [<804e0660>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855ddc80 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856cc800 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dfd71000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:85616b8c r4:8547ff00 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:85616b8c r4:8547ff00 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856cc800 r8:8547ff2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8547ff00 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8547ff00 r8:8027ade4 r7:dfc35e60 r6:8563a000 r5:856cc800 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc31fb0 to 0xdfc31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:8563d980 INFO: task kworker/0:68:4262 is blocked on a mutex likely owned by task kworker/0:39:4180. task:kworker/0:39 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3f164>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7288) r10:8280c9b4 r9:856b0000 r8:80200c04 r7:dfebdd54 r6:ffffffff r5:856b0000 r4:00000000 [<81a3f124>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfebdd20 to 0xdfebdd68) dd20: 85cd0000 ed7dd000 00000001 80239bb8 7f079000 00000001 82ac8f44 82ac8320 dd40: 7f079000 ed7dd000 8280c9b4 dfebdd9c dfebdda0 dfebdd70 80230af0 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e0424>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82ac8f64 [<804e01a0>] (__purge_vmap_area_lazy) from [<804e07dc>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfebddc0 r5:dfebde08 r4:dfebddc0 [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc15c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:df9cf000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:84eeb38c r4:84fd8500 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:84eeb38c r4:84fd8500 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856b0000 r8:84fd852c r7:82804d40 r6:dddced40 r5:dddced60 r4:84fd8500 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84fd8500 r8:8027ade4 r7:dfe51e60 r6:84da7700 r5:856b0000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfebdfb0 to 0xdfebdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84fd5e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:69:4264 blocked for more than 431 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:69 state:D stack:0 pid:4264 tgid:4264 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3ed30>] (__schedule_loop kernel/sched/core.c:7043 [inline]) [<81a3dd9c>] (__schedule) from [<81a3ed30>] (schedule+0x2c/0x130 kernel/sched/core.c:7058) r10:dfc7dd84 r9:00000002 r8:60000113 r7:82916594 r6:dfc7dd8c r5:856cd400 r4:856cd400 [<81a3ed04>] (schedule) from [<81a3f118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7115) r5:856cd400 r4:82916590 [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a41978>] (__mutex_lock.constprop.0) from [<81a42470>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc7de08 r4:00000000 [<81a4245c>] (__mutex_lock_slowpath) from [<81a424b0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a42474>] (mutex_lock) from [<804e0660>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8563dbc0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856cd400 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dfd01000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:85614f8c r4:8563a080 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:85614f8c r4:8563a080 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856cd400 r8:8563a0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8563a080 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8563a080 r8:8027ade4 r7:dfc31e60 r6:8563a100 r5:856cd400 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc7dfb0 to 0xdfc7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:8563d6c0 INFO: task kworker/0:69:4264 is blocked on a mutex likely owned by task kworker/0:39:4180. task:kworker/0:39 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3f164>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7288) r10:8280c9b4 r9:856b0000 r8:80200c04 r7:dfebdd54 r6:ffffffff r5:856b0000 r4:00000000 [<81a3f124>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfebdd20 to 0xdfebdd68) dd20: 85cd0000 ed7dd000 00000001 80239bb8 7f079000 00000001 82ac8f44 82ac8320 dd40: 7f079000 ed7dd000 8280c9b4 dfebdd9c dfebdda0 dfebdd70 80230af0 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e0424>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82ac8f64 [<804e01a0>] (__purge_vmap_area_lazy) from [<804e07dc>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfebddc0 r5:dfebde08 r4:dfebddc0 [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc15c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:df9cf000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:84eeb38c r4:84fd8500 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:84eeb38c r4:84fd8500 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856b0000 r8:84fd852c r7:82804d40 r6:dddced40 r5:dddced60 r4:84fd8500 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84fd8500 r8:8027ade4 r7:dfe51e60 r6:84da7700 r5:856b0000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfebdfb0 to 0xdfebdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84fd5e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:70:4266 blocked for more than 431 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:70 state:D stack:0 pid:4266 tgid:4266 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3ed30>] (__schedule_loop kernel/sched/core.c:7043 [inline]) [<81a3dd9c>] (__schedule) from [<81a3ed30>] (schedule+0x2c/0x130 kernel/sched/core.c:7058) r10:e02c9d84 r9:00000002 r8:60000013 r7:82916594 r6:e02c9d8c r5:856cec00 r4:856cec00 [<81a3ed04>] (schedule) from [<81a3f118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7115) r5:856cec00 r4:82916590 [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a41978>] (__mutex_lock.constprop.0) from [<81a42470>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e02c9e08 r4:00000000 [<81a4245c>] (__mutex_lock_slowpath) from [<81a424b0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a42474>] (mutex_lock) from [<804e0660>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8563de80 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856cec00 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dfd23000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:8561638c r4:8563a180 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:8561638c r4:8563a180 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856cec00 r8:8563a1ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8563a180 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8563a180 r8:8027ade4 r7:dfc31e60 r6:8563a200 r5:856cec00 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe02c9fb0 to 0xe02c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:8563db40 INFO: task kworker/0:70:4266 is blocked on a mutex likely owned by task kworker/0:39:4180. task:kworker/0:39 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3f164>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7288) r10:8280c9b4 r9:856b0000 r8:80200c04 r7:dfebdd54 r6:ffffffff r5:856b0000 r4:00000000 [<81a3f124>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfebdd20 to 0xdfebdd68) dd20: 8634e000 ed7dd000 00000001 80239bb8 7f079000 00000001 82ac8f44 82ac8320 dd40: 7f079000 ed7dd000 8280c9b4 dfebdd9c dfebdda0 dfebdd70 80230af0 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e0424>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82ac8f64 [<804e01a0>] (__purge_vmap_area_lazy) from [<804e07dc>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfebddc0 r5:dfebde08 r4:dfebddc0 [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc15c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:df9cf000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:84eeb38c r4:84fd8500 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:84eeb38c r4:84fd8500 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856b0000 r8:84fd852c r7:82804d40 r6:dddced40 r5:dddced60 r4:84fd8500 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84fd8500 r8:8027ade4 r7:dfe51e60 r6:84da7700 r5:856b0000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfebdfb0 to 0xdfebdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84fd5e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:71:4268 blocked for more than 431 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:71 state:D stack:0 pid:4268 tgid:4268 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3ed30>] (__schedule_loop kernel/sched/core.c:7043 [inline]) [<81a3dd9c>] (__schedule) from [<81a3ed30>] (schedule+0x2c/0x130 kernel/sched/core.c:7058) r10:e02c5d84 r9:00000002 r8:60000113 r7:82916594 r6:e02c5d8c r5:856ce000 r4:856ce000 [<81a3ed04>] (schedule) from [<81a3f118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7115) r5:856ce000 r4:82916590 [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a41978>] (__mutex_lock.constprop.0) from [<81a42470>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e02c5e08 r4:00000000 [<81a4245c>] (__mutex_lock_slowpath) from [<81a424b0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a42474>] (mutex_lock) from [<804e0660>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8563dfc0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856ce000 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dfd4f000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:8561678c r4:8563a280 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:8561678c r4:8563a280 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856ce000 r8:8563a2ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8563a280 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8563a280 r8:8027ade4 r7:dfc31e60 r6:8563a300 r5:856ce000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe02c5fb0 to 0xe02c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:8563d680 INFO: task kworker/0:71:4268 is blocked on a mutex likely owned by task kworker/0:39:4180. task:kworker/0:39 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3f164>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7288) r10:8280c9b4 r9:856b0000 r8:80200c04 r7:dfebdd54 r6:ffffffff r5:856b0000 r4:00000000 [<81a3f124>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfebdd20 to 0xdfebdd68) dd20: 8634e000 ed7dd000 00000001 80239bb8 7f079000 00000001 82ac8f44 82ac8320 dd40: 7f079000 ed7dd000 8280c9b4 dfebdd9c dfebdda0 dfebdd70 80230af0 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e0424>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82ac8f64 [<804e01a0>] (__purge_vmap_area_lazy) from [<804e07dc>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfebddc0 r5:dfebde08 r4:dfebddc0 [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc15c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:df9cf000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:84eeb38c r4:84fd8500 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:84eeb38c r4:84fd8500 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856b0000 r8:84fd852c r7:82804d40 r6:dddced40 r5:dddced60 r4:84fd8500 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84fd8500 r8:8027ade4 r7:dfe51e60 r6:84da7700 r5:856b0000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfebdfb0 to 0xdfebdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84fd5e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:72:4270 blocked for more than 431 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:72 state:D stack:0 pid:4270 tgid:4270 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3ed30>] (__schedule_loop kernel/sched/core.c:7043 [inline]) [<81a3dd9c>] (__schedule) from [<81a3ed30>] (schedule+0x2c/0x130 kernel/sched/core.c:7058) r10:e02d9d84 r9:00000002 r8:60000013 r7:82916594 r6:e02d9d8c r5:855b6000 r4:855b6000 [<81a3ed04>] (schedule) from [<81a3f118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7115) r5:855b6000 r4:82916590 [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a41978>] (__mutex_lock.constprop.0) from [<81a42470>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e02d9e08 r4:00000000 [<81a4245c>] (__mutex_lock_slowpath) from [<81a424b0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a42474>] (mutex_lock) from [<804e0660>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855ddf00 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:855b6000 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:df95d000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:85616f8c r4:8563a380 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:85616f8c r4:8563a380 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855b6000 r8:8563a3ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8563a380 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8563a380 r8:8027ade4 r7:dfc31e60 r6:85639780 r5:855b6000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe02d9fb0 to 0xe02d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84fadbc0 INFO: task kworker/0:72:4270 is blocked on a mutex likely owned by task kworker/0:39:4180. task:kworker/0:39 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3f164>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7288) r10:8280c9b4 r9:856b0000 r8:80200c04 r7:dfebdd54 r6:ffffffff r5:856b0000 r4:00000000 [<81a3f124>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfebdd20 to 0xdfebdd68) dd20: 8634e000 ed7dd000 00000001 80239bb8 7f079000 00000001 82ac8f44 82ac8320 dd40: 7f079000 ed7dd000 8280c9b4 dfebdd9c dfebdda0 dfebdd70 80230af0 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e0424>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82ac8f64 [<804e01a0>] (__purge_vmap_area_lazy) from [<804e07dc>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfebddc0 r5:dfebde08 r4:dfebddc0 [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc15c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:df9cf000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:84eeb38c r4:84fd8500 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:84eeb38c r4:84fd8500 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856b0000 r8:84fd852c r7:82804d40 r6:dddced40 r5:dddced60 r4:84fd8500 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84fd8500 r8:8027ade4 r7:dfe51e60 r6:84da7700 r5:856b0000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfebdfb0 to 0xdfebdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84fd5e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:73:4271 blocked for more than 431 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:73 state:D stack:0 pid:4271 tgid:4271 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3ed30>] (__schedule_loop kernel/sched/core.c:7043 [inline]) [<81a3dd9c>] (__schedule) from [<81a3ed30>] (schedule+0x2c/0x130 kernel/sched/core.c:7058) r10:e02ddd84 r9:00000002 r8:60000013 r7:82916594 r6:e02ddd8c r5:855b0c00 r4:855b0c00 [<81a3ed04>] (schedule) from [<81a3f118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7115) r5:855b0c00 r4:82916590 [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a41978>] (__mutex_lock.constprop.0) from [<81a42470>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e02dde08 r4:00000000 [<81a4245c>] (__mutex_lock_slowpath) from [<81a424b0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a42474>] (mutex_lock) from [<804e0660>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8563df00 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:855b0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f027000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:df973000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:8561738c r4:8563a400 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:8561738c r4:8563a400 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855b0c00 r8:8563a42c r7:82804d40 r6:dddced40 r5:dddced60 r4:8563a400 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8563a400 r8:8027ade4 r7:e02d9e60 r6:85639880 r5:855b0c00 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe02ddfb0 to 0xe02ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84fadbc0 INFO: task kworker/0:73:4271 is blocked on a mutex likely owned by task kworker/0:39:4180. task:kworker/0:39 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3f164>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7288) r10:8280c9b4 r9:856b0000 r8:80200c04 r7:dfebdd54 r6:ffffffff r5:856b0000 r4:00000000 [<81a3f124>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfebdd20 to 0xdfebdd68) dd20: 8634e000 ed7dd000 00000001 80239bb8 7f079000 00000001 82ac8f44 82ac8320 dd40: 7f079000 ed7dd000 8280c9b4 dfebdd9c dfebdda0 dfebdd70 80230af0 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e0424>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82ac8f64 [<804e01a0>] (__purge_vmap_area_lazy) from [<804e07dc>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfebddc0 r5:dfebde08 r4:dfebddc0 [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc15c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:df9cf000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:84eeb38c r4:84fd8500 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:84eeb38c r4:84fd8500 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856b0000 r8:84fd852c r7:82804d40 r6:dddced40 r5:dddced60 r4:84fd8500 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84fd8500 r8:8027ade4 r7:dfe51e60 r6:84da7700 r5:856b0000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfebdfb0 to 0xdfebdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84fd5e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:74:4274 blocked for more than 431 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:74 state:D stack:0 pid:4274 tgid:4274 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3ed30>] (__schedule_loop kernel/sched/core.c:7043 [inline]) [<81a3dd9c>] (__schedule) from [<81a3ed30>] (schedule+0x2c/0x130 kernel/sched/core.c:7058) r10:dfa1dd84 r9:00000002 r8:60000013 r7:82916594 r6:dfa1dd8c r5:855b3c00 r4:855b3c00 [<81a3ed04>] (schedule) from [<81a3f118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7115) r5:855b3c00 r4:82916590 [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a41978>] (__mutex_lock.constprop.0) from [<81a42470>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa1de08 r4:00000000 [<81a4245c>] (__mutex_lock_slowpath) from [<81a424b0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a42474>] (mutex_lock) from [<804e0660>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856417c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:855b3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dfa77000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:85620b8c r4:8563a480 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:85620b8c r4:8563a480 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855b3c00 r8:8563a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8563a480 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8563a480 r8:8027ade4 r7:e02dde60 r6:85639900 r5:855b3c00 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa1dfb0 to 0xdfa1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:8563db40 INFO: task kworker/0:74:4274 is blocked on a mutex likely owned by task kworker/0:39:4180. task:kworker/0:39 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3f164>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7288) r10:8280c9b4 r9:856b0000 r8:80200c04 r7:dfebdd54 r6:ffffffff r5:856b0000 r4:00000000 [<81a3f124>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfebdd20 to 0xdfebdd68) dd20: 86675000 ed7dd000 00000001 80239bb8 7f079000 00000001 82ac8f44 82ac8320 dd40: 7f079000 ed7dd000 8280c9b4 dfebdd9c dfebdda0 dfebdd70 80230af0 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e0424>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82ac8f64 [<804e01a0>] (__purge_vmap_area_lazy) from [<804e07dc>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfebddc0 r5:dfebde08 r4:dfebddc0 [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc15c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:df9cf000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:84eeb38c r4:84fd8500 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:84eeb38c r4:84fd8500 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856b0000 r8:84fd852c r7:82804d40 r6:dddced40 r5:dddced60 r4:84fd8500 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84fd8500 r8:8027ade4 r7:dfe51e60 r6:84da7700 r5:856b0000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfebdfb0 to 0xdfebdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84fd5e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:75:4275 blocked for more than 431 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:75 state:D stack:0 pid:4275 tgid:4275 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3ed30>] (__schedule_loop kernel/sched/core.c:7043 [inline]) [<81a3dd9c>] (__schedule) from [<81a3ed30>] (schedule+0x2c/0x130 kernel/sched/core.c:7058) r10:dfd75d84 r9:00000002 r8:60000113 r7:82916594 r6:dfd75d8c r5:856c9800 r4:856c9800 [<81a3ed04>] (schedule) from [<81a3f118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7115) r5:856c9800 r4:82916590 [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a41978>] (__mutex_lock.constprop.0) from [<81a42470>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd75e08 r4:00000000 [<81a4245c>] (__mutex_lock_slowpath) from [<81a424b0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a42474>] (mutex_lock) from [<804e0660>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d0ec0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856c9800 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:df9b9000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:8561778c r4:8563a500 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:8561778c r4:8563a500 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856c9800 r8:8563a52c r7:82804d40 r6:dddced40 r5:dddced60 r4:8563a500 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8563a500 r8:8027ade4 r7:dfa1de60 r6:8563a580 r5:856c9800 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd75fb0 to 0xdfd75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:854d0c40 INFO: task kworker/0:75:4275 is blocked on a mutex likely owned by task kworker/0:39:4180. task:kworker/0:39 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3f164>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7288) r10:8280c9b4 r9:856b0000 r8:80200c04 r7:dfebdd54 r6:ffffffff r5:856b0000 r4:00000000 [<81a3f124>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfebdd20 to 0xdfebdd68) dd20: 86675000 ed7dd000 00000001 80239bb8 7f079000 00000001 82ac8f44 82ac8320 dd40: 7f079000 ed7dd000 8280c9b4 dfebdd9c dfebdda0 dfebdd70 80230af0 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e0424>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82ac8f64 [<804e01a0>] (__purge_vmap_area_lazy) from [<804e07dc>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfebddc0 r5:dfebde08 r4:dfebddc0 [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc15c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:df9cf000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:84eeb38c r4:84fd8500 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:84eeb38c r4:84fd8500 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856b0000 r8:84fd852c r7:82804d40 r6:dddced40 r5:dddced60 r4:84fd8500 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84fd8500 r8:8027ade4 r7:dfe51e60 r6:84da7700 r5:856b0000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfebdfb0 to 0xdfebdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84fd5e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:76:4278 blocked for more than 431 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:76 state:D stack:0 pid:4278 tgid:4278 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3ed30>] (__schedule_loop kernel/sched/core.c:7043 [inline]) [<81a3dd9c>] (__schedule) from [<81a3ed30>] (schedule+0x2c/0x130 kernel/sched/core.c:7058) r10:e02cdd84 r9:00000002 r8:60000113 r7:82916594 r6:e02cdd8c r5:856c6000 r4:856c6000 [<81a3ed04>] (schedule) from [<81a3f118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7115) r5:856c6000 r4:82916590 [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a41978>] (__mutex_lock.constprop.0) from [<81a42470>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e02cde08 r4:00000000 [<81a4245c>] (__mutex_lock_slowpath) from [<81a424b0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a42474>] (mutex_lock) from [<804e0660>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85641040 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856c6000 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:df9df000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:85617b8c r4:8563a680 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:85617b8c r4:8563a680 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856c6000 r8:8563a6ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8563a680 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8563a680 r8:8027ade4 r7:dfa1de60 r6:8563a700 r5:856c6000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe02cdfb0 to 0xe02cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:85641000 INFO: task kworker/0:76:4278 is blocked on a mutex likely owned by task kworker/0:39:4180. task:kworker/0:39 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3f164>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7288) r10:8280c9b4 r9:856b0000 r8:80200c04 r7:dfebdd54 r6:ffffffff r5:856b0000 r4:00000000 [<81a3f124>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfebdd20 to 0xdfebdd68) dd20: 868f5000 ed7dd000 00000001 80239bb8 7f079000 00000001 82ac8f44 82ac8320 dd40: 7f079000 ed7dd000 8280c9b4 dfebdd9c dfebdda0 dfebdd70 80230af0 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e0424>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82ac8f64 [<804e01a0>] (__purge_vmap_area_lazy) from [<804e07dc>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfebddc0 r5:dfebde08 r4:dfebddc0 [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc15c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:df9cf000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:84eeb38c r4:84fd8500 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:84eeb38c r4:84fd8500 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856b0000 r8:84fd852c r7:82804d40 r6:dddced40 r5:dddced60 r4:84fd8500 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84fd8500 r8:8027ade4 r7:dfe51e60 r6:84da7700 r5:856b0000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfebdfb0 to 0xdfebdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84fd5e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:77:4279 blocked for more than 431 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:77 state:D stack:0 pid:4279 tgid:4279 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3ed30>] (__schedule_loop kernel/sched/core.c:7043 [inline]) [<81a3dd9c>] (__schedule) from [<81a3ed30>] (schedule+0x2c/0x130 kernel/sched/core.c:7058) r10:dfa25d84 r9:00000002 r8:60000013 r7:82916594 r6:dfa25d8c r5:855a0000 r4:855a0000 [<81a3ed04>] (schedule) from [<81a3f118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7115) r5:855a0000 r4:82916590 [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a41978>] (__mutex_lock.constprop.0) from [<81a42470>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa25e08 r4:00000000 [<81a4245c>] (__mutex_lock_slowpath) from [<81a424b0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a42474>] (mutex_lock) from [<804e0660>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f32f00 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:855a0000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dfe27000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:8562278c r4:8563a780 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:8562278c r4:8563a780 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855a0000 r8:8563a7ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8563a780 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8563a780 r8:8027ade4 r7:dfa1de60 r6:8563a880 r5:855a0000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa25fb0 to 0xdfa25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:85641000 INFO: task kworker/0:77:4279 is blocked on a mutex likely owned by task kworker/0:39:4180. task:kworker/0:39 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3f164>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7288) r10:8280c9b4 r9:856b0000 r8:80200c04 r7:dfebdd54 r6:ffffffff r5:856b0000 r4:00000000 [<81a3f124>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfebdd20 to 0xdfebdd68) dd20: 868f5000 ed7dd000 00000001 80239bb8 7f079000 00000001 82ac8f44 82ac8320 dd40: 7f079000 ed7dd000 8280c9b4 dfebdd9c dfebdda0 dfebdd70 80230af0 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e0424>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82ac8f64 [<804e01a0>] (__purge_vmap_area_lazy) from [<804e07dc>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfebddc0 r5:dfebde08 r4:dfebddc0 [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc15c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:df9cf000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:84eeb38c r4:84fd8500 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:84eeb38c r4:84fd8500 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856b0000 r8:84fd852c r7:82804d40 r6:dddced40 r5:dddced60 r4:84fd8500 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84fd8500 r8:8027ade4 r7:dfe51e60 r6:84da7700 r5:856b0000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfebdfb0 to 0xdfebdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84fd5e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:78:4280 blocked for more than 431 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:78 state:D stack:0 pid:4280 tgid:4280 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3ed30>] (__schedule_loop kernel/sched/core.c:7043 [inline]) [<81a3dd9c>] (__schedule) from [<81a3ed30>] (schedule+0x2c/0x130 kernel/sched/core.c:7058) r10:dfd95d84 r9:00000002 r8:60000113 r7:82916594 r6:dfd95d8c r5:83abbc00 r4:83abbc00 [<81a3ed04>] (schedule) from [<81a3f118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7115) r5:83abbc00 r4:82916590 [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a41978>] (__mutex_lock.constprop.0) from [<81a42470>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd95e08 r4:00000000 [<81a4245c>] (__mutex_lock_slowpath) from [<81a424b0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a42474>] (mutex_lock) from [<804e0660>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856381c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:83abbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dfa55000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:85686b8c r4:8563a980 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:85686b8c r4:8563a980 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83abbc00 r8:8563a9ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8563a980 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8563a980 r8:8027ade4 r7:dfa25e60 r6:85639b00 r5:83abbc00 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd95fb0 to 0xdfd95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:85641380 INFO: task kworker/0:78:4280 is blocked on a mutex likely owned by task kworker/0:39:4180. task:kworker/0:39 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3f164>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7288) r10:8280c9b4 r9:856b0000 r8:80200c04 r7:dfebdd54 r6:ffffffff r5:856b0000 r4:00000000 [<81a3f124>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfebdd20 to 0xdfebdd68) dd20: 86cb1000 ed7dd000 00000001 80239bb8 7f079000 00000001 82ac8f44 82ac8320 dd40: 7f079000 ed7dd000 8280c9b4 dfebdd9c dfebdda0 dfebdd70 80230af0 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e0424>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82ac8f64 [<804e01a0>] (__purge_vmap_area_lazy) from [<804e07dc>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfebddc0 r5:dfebde08 r4:dfebddc0 [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc15c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:df9cf000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:84eeb38c r4:84fd8500 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:84eeb38c r4:84fd8500 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856b0000 r8:84fd852c r7:82804d40 r6:dddced40 r5:dddced60 r4:84fd8500 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84fd8500 r8:8027ade4 r7:dfe51e60 r6:84da7700 r5:856b0000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfebdfb0 to 0xdfebdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84fd5e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:79:4285 blocked for more than 431 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:79 state:D stack:0 pid:4285 tgid:4285 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3ed30>] (__schedule_loop kernel/sched/core.c:7043 [inline]) [<81a3dd9c>] (__schedule) from [<81a3ed30>] (schedule+0x2c/0x130 kernel/sched/core.c:7058) r10:dfdb9d84 r9:00000002 r8:60000113 r7:82916594 r6:dfdb9d8c r5:84993c00 r4:84993c00 [<81a3ed04>] (schedule) from [<81a3f118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7115) r5:84993c00 r4:82916590 [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a41978>] (__mutex_lock.constprop.0) from [<81a42470>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfdb9e08 r4:00000000 [<81a4245c>] (__mutex_lock_slowpath) from [<81a424b0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a42474>] (mutex_lock) from [<804e0660>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85641a80 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:84993c00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dfcfb000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:85620f8c r4:8563aa00 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:85620f8c r4:8563aa00 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84993c00 r8:8563aa2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8563aa00 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8563aa00 r8:8027ade4 r7:dfa25e60 r6:85639a80 r5:84993c00 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfdb9fb0 to 0xdfdb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:85641740 INFO: task kworker/0:79:4285 is blocked on a mutex likely owned by task kworker/0:39:4180. task:kworker/0:39 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3f164>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7288) r10:8280c9b4 r9:856b0000 r8:80200c04 r7:dfebdd54 r6:ffffffff r5:856b0000 r4:00000000 [<81a3f124>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfebdd20 to 0xdfebdd68) dd20: 86f8f000 ed7dd000 00000001 80239bb8 7f079000 00000001 82ac8f44 82ac8320 dd40: 7f079000 ed7dd000 8280c9b4 dfebdd9c dfebdda0 dfebdd70 80230af0 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e0424>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82ac8f64 [<804e01a0>] (__purge_vmap_area_lazy) from [<804e07dc>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfebddc0 r5:dfebde08 r4:dfebddc0 [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc15c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:df9cf000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:84eeb38c r4:84fd8500 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:84eeb38c r4:84fd8500 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856b0000 r8:84fd852c r7:82804d40 r6:dddced40 r5:dddced60 r4:84fd8500 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84fd8500 r8:8027ade4 r7:dfe51e60 r6:84da7700 r5:856b0000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfebdfb0 to 0xdfebdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84fd5e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:80:4286 blocked for more than 431 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:80 state:D stack:0 pid:4286 tgid:4286 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3ed30>] (__schedule_loop kernel/sched/core.c:7043 [inline]) [<81a3dd9c>] (__schedule) from [<81a3ed30>] (schedule+0x2c/0x130 kernel/sched/core.c:7058) r10:dfd99d84 r9:00000002 r8:60000013 r7:82916594 r6:dfd99d8c r5:84996000 r4:84996000 [<81a3ed04>] (schedule) from [<81a3f118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7115) r5:84996000 r4:82916590 [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a41978>] (__mutex_lock.constprop.0) from [<81a42470>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd99e08 r4:00000000 [<81a4245c>] (__mutex_lock_slowpath) from [<81a424b0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a42474>] (mutex_lock) from [<804e0660>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85641c00 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:84996000 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dfd57000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:8562138c r4:8563aa80 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:8562138c r4:8563aa80 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84996000 r8:8563aaac r7:82804d40 r6:dddced40 r5:dddced60 r4:8563aa80 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8563aa80 r8:8027ade4 r7:dfa25e60 r6:85639a00 r5:84996000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd99fb0 to 0xdfd99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:85641680 INFO: task kworker/0:80:4286 is blocked on a mutex likely owned by task kworker/0:39:4180. task:kworker/0:39 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3f164>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7288) r10:8280c9b4 r9:856b0000 r8:80200c04 r7:dfebdd54 r6:ffffffff r5:856b0000 r4:00000000 [<81a3f124>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfebdd20 to 0xdfebdd68) dd20: 86f8f000 ed7dd000 00000001 80239bb8 7f079000 00000001 82ac8f44 82ac8320 dd40: 7f079000 ed7dd000 8280c9b4 dfebdd9c dfebdda0 dfebdd70 80230af0 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e0424>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82ac8f64 [<804e01a0>] (__purge_vmap_area_lazy) from [<804e07dc>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfebddc0 r5:dfebde08 r4:dfebddc0 [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc15c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:df9cf000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:84eeb38c r4:84fd8500 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:84eeb38c r4:84fd8500 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856b0000 r8:84fd852c r7:82804d40 r6:dddced40 r5:dddced60 r4:84fd8500 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84fd8500 r8:8027ade4 r7:dfe51e60 r6:84da7700 r5:856b0000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfebdfb0 to 0xdfebdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84fd5e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:81:4289 blocked for more than 431 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:81 state:D stack:0 pid:4289 tgid:4289 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3ed30>] (__schedule_loop kernel/sched/core.c:7043 [inline]) [<81a3dd9c>] (__schedule) from [<81a3ed30>] (schedule+0x2c/0x130 kernel/sched/core.c:7058) r10:dfdd1d84 r9:00000002 r8:60000013 r7:82916594 r6:dfdd1d8c r5:84e20c00 r4:84e20c00 [<81a3ed04>] (schedule) from [<81a3f118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7115) r5:84e20c00 r4:82916590 [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a41978>] (__mutex_lock.constprop.0) from [<81a42470>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfdd1e08 r4:00000000 [<81a4245c>] (__mutex_lock_slowpath) from [<81a424b0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a42474>] (mutex_lock) from [<804e0660>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85641ec0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:84e20c00 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dfd9d000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:8562178c r4:8563ab00 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:8562178c r4:8563ab00 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e20c00 r8:8563ab2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8563ab00 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8563ab00 r8:8027ade4 r7:dfa25e60 r6:85639c00 r5:84e20c00 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfdd1fb0 to 0xdfdd1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:85641e80 INFO: task kworker/0:81:4289 is blocked on a mutex likely owned by task kworker/0:39:4180. task:kworker/0:39 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3f164>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7288) r10:8280c9b4 r9:856b0000 r8:80200c04 r7:dfebdd54 r6:ffffffff r5:856b0000 r4:00000000 [<81a3f124>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfebdd20 to 0xdfebdd68) dd20: 87245000 ed7dd000 00000001 80239bb8 7f079000 00000001 82ac8f44 82ac8320 dd40: 7f079000 ed7dd000 8280c9b4 dfebdd9c dfebdda0 dfebdd70 80230af0 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e0424>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82ac8f64 [<804e01a0>] (__purge_vmap_area_lazy) from [<804e07dc>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfebddc0 r5:dfebde08 r4:dfebddc0 [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc15c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:df9cf000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:84eeb38c r4:84fd8500 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:84eeb38c r4:84fd8500 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856b0000 r8:84fd852c r7:82804d40 r6:dddced40 r5:dddced60 r4:84fd8500 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84fd8500 r8:8027ade4 r7:dfe51e60 r6:84da7700 r5:856b0000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfebdfb0 to 0xdfebdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84fd5e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:82:4291 blocked for more than 431 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:82 state:D stack:0 pid:4291 tgid:4291 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3ed30>] (__schedule_loop kernel/sched/core.c:7043 [inline]) [<81a3dd9c>] (__schedule) from [<81a3ed30>] (schedule+0x2c/0x130 kernel/sched/core.c:7058) r10:dfde5d84 r9:00000002 r8:60000013 r7:82916594 r6:dfde5d8c r5:84e22400 r4:84e22400 [<81a3ed04>] (schedule) from [<81a3f118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7115) r5:84e22400 r4:82916590 [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a41978>] (__mutex_lock.constprop.0) from [<81a42470>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfde5e08 r4:00000000 [<81a4245c>] (__mutex_lock_slowpath) from [<81a424b0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a42474>] (mutex_lock) from [<804e0660>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85641e40 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:84e22400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dfdc7000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:8562078c r4:8563ab80 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:8562078c r4:8563ab80 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e22400 r8:8563abac r7:82804d40 r6:dddced40 r5:dddced60 r4:8563ab80 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8563ab80 r8:8027ade4 r7:dfa25e60 r6:85639d80 r5:84e22400 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfde5fb0 to 0xdfde5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:85641dc0 INFO: task kworker/0:82:4291 is blocked on a mutex likely owned by task kworker/0:39:4180. task:kworker/0:39 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3f164>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7288) r10:8280c9b4 r9:856b0000 r8:80200c04 r7:dfebdd54 r6:ffffffff r5:856b0000 r4:00000000 [<81a3f124>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfebdd20 to 0xdfebdd68) dd20: 87245000 ed7dd000 00000001 80239bb8 7f079000 00000001 82ac8f44 82ac8320 dd40: 7f079000 ed7dd000 8280c9b4 dfebdd9c dfebdda0 dfebdd70 80230af0 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e0424>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82ac8f64 [<804e01a0>] (__purge_vmap_area_lazy) from [<804e07dc>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfebddc0 r5:dfebde08 r4:dfebddc0 [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc15c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:df9cf000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:84eeb38c r4:84fd8500 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:84eeb38c r4:84fd8500 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856b0000 r8:84fd852c r7:82804d40 r6:dddced40 r5:dddced60 r4:84fd8500 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84fd8500 r8:8027ade4 r7:dfe51e60 r6:84da7700 r5:856b0000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfebdfb0 to 0xdfebdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84fd5e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:83:4293 blocked for more than 431 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:83 state:D stack:0 pid:4293 tgid:4293 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3ed30>] (__schedule_loop kernel/sched/core.c:7043 [inline]) [<81a3dd9c>] (__schedule) from [<81a3ed30>] (schedule+0x2c/0x130 kernel/sched/core.c:7058) r10:dfe05d84 r9:00000002 r8:60000013 r7:82916594 r6:dfe05d8c r5:84e23000 r4:84e23000 [<81a3ed04>] (schedule) from [<81a3f118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7115) r5:84e23000 r4:82916590 [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a41978>] (__mutex_lock.constprop.0) from [<81a42470>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe05e08 r4:00000000 [<81a4245c>] (__mutex_lock_slowpath) from [<81a424b0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a42474>] (mutex_lock) from [<804e0660>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855d2640 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:84e23000 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dfde9000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:85621b8c r4:8563ac00 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:85621b8c r4:8563ac00 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e23000 r8:8563ac2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8563ac00 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8563ac00 r8:8027ade4 r7:dfa25e60 r6:85639d00 r5:84e23000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe05fb0 to 0xdfe05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84f33200 INFO: task kworker/0:83:4293 is blocked on a mutex likely owned by task kworker/0:39:4180. task:kworker/0:39 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3f164>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7288) r10:8280c9b4 r9:856b0000 r8:80200c04 r7:dfebdd54 r6:ffffffff r5:856b0000 r4:00000000 [<81a3f124>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfebdd20 to 0xdfebdd68) dd20: 87245000 ed7dd000 00000001 80239bb8 7f079000 00000001 82ac8f44 82ac8320 dd40: 7f079000 ed7dd000 8280c9b4 dfebdd9c dfebdda0 dfebdd70 80230af0 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e0424>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82ac8f64 [<804e01a0>] (__purge_vmap_area_lazy) from [<804e07dc>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfebddc0 r5:dfebde08 r4:dfebddc0 [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc15c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:df9cf000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:84eeb38c r4:84fd8500 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:84eeb38c r4:84fd8500 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856b0000 r8:84fd852c r7:82804d40 r6:dddced40 r5:dddced60 r4:84fd8500 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84fd8500 r8:8027ade4 r7:dfe51e60 r6:84da7700 r5:856b0000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfebdfb0 to 0xdfebdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84fd5e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:84:4294 blocked for more than 431 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:84 state:D stack:0 pid:4294 tgid:4294 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3ed30>] (__schedule_loop kernel/sched/core.c:7043 [inline]) [<81a3dd9c>] (__schedule) from [<81a3ed30>] (schedule+0x2c/0x130 kernel/sched/core.c:7058) r10:dfe19d84 r9:00000002 r8:60000113 r7:82916594 r6:dfe19d8c r5:84e23c00 r4:84e23c00 [<81a3ed04>] (schedule) from [<81a3f118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7115) r5:84e23c00 r4:82916590 [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a41978>] (__mutex_lock.constprop.0) from [<81a42470>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe19e08 r4:00000000 [<81a4245c>] (__mutex_lock_slowpath) from [<81a424b0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a42474>] (mutex_lock) from [<804e0660>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8563d2c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:84e23c00 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dfe01000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:8562238c r4:8563ac80 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:8562238c r4:8563ac80 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e23c00 r8:8563acac r7:82804d40 r6:dddced40 r5:dddced60 r4:8563ac80 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8563ac80 r8:8027ade4 r7:dfa25e60 r6:85639c80 r5:84e23c00 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe19fb0 to 0xdfe19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84f33200 INFO: task kworker/0:84:4294 is blocked on a mutex likely owned by task kworker/0:39:4180. task:kworker/0:39 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3f164>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7288) r10:8280c9b4 r9:856b0000 r8:80200c04 r7:dfebdd54 r6:ffffffff r5:856b0000 r4:00000000 [<81a3f124>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfebdd20 to 0xdfebdd68) dd20: 87245000 ed7dd000 00000001 80239bb8 7f079000 00000001 82ac8f44 82ac8320 dd40: 7f079000 ed7dd000 8280c9b4 dfebdd9c dfebdda0 dfebdd70 80230af0 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e0424>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82ac8f64 [<804e01a0>] (__purge_vmap_area_lazy) from [<804e07dc>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfebddc0 r5:dfebde08 r4:dfebddc0 [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc15c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:df9cf000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:84eeb38c r4:84fd8500 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:84eeb38c r4:84fd8500 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856b0000 r8:84fd852c r7:82804d40 r6:dddced40 r5:dddced60 r4:84fd8500 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84fd8500 r8:8027ade4 r7:dfe51e60 r6:84da7700 r5:856b0000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfebdfb0 to 0xdfebdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84fd5e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:86:4298 blocked for more than 431 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:86 state:D stack:0 pid:4298 tgid:4298 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3ed30>] (__schedule_loop kernel/sched/core.c:7043 [inline]) [<81a3dd9c>] (__schedule) from [<81a3ed30>] (schedule+0x2c/0x130 kernel/sched/core.c:7058) r10:dfe1dd84 r9:00000002 r8:60000113 r7:82916594 r6:dfe1dd8c r5:855a3c00 r4:855a3c00 [<81a3ed04>] (schedule) from [<81a3f118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7115) r5:855a3c00 r4:82916590 [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a41978>] (__mutex_lock.constprop.0) from [<81a42470>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe1de08 r4:00000000 [<81a4245c>] (__mutex_lock_slowpath) from [<81a424b0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a42474>] (mutex_lock) from [<804e0660>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85648f40 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:855a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dfb5b000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:8568778c r4:8563ae00 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:8568778c r4:8563ae00 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855a3c00 r8:8563ae2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8563ae00 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8563ae00 r8:8027ade4 r7:dfe45e60 r6:8563ae80 r5:855a3c00 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe1dfb0 to 0xdfe1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84f32ac0 INFO: task kworker/0:86:4298 is blocked on a mutex likely owned by task kworker/0:39:4180. task:kworker/0:39 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3f164>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7288) r10:8280c9b4 r9:856b0000 r8:80200c04 r7:dfebdd54 r6:ffffffff r5:856b0000 r4:00000000 [<81a3f124>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfebdd20 to 0xdfebdd68) dd20: 87245000 ed7dd000 00000001 80239bb8 7f079000 00000001 82ac8f44 82ac8320 dd40: 7f079000 ed7dd000 8280c9b4 dfebdd9c dfebdda0 dfebdd70 80230af0 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e0424>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82ac8f64 [<804e01a0>] (__purge_vmap_area_lazy) from [<804e07dc>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfebddc0 r5:dfebde08 r4:dfebddc0 [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc15c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:df9cf000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:84eeb38c r4:84fd8500 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:84eeb38c r4:84fd8500 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856b0000 r8:84fd852c r7:82804d40 r6:dddced40 r5:dddced60 r4:84fd8500 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84fd8500 r8:8027ade4 r7:dfe51e60 r6:84da7700 r5:856b0000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfebdfb0 to 0xdfebdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84fd5e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:60:4302 blocked for more than 431 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:60 state:D stack:0 pid:4302 tgid:4302 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3ed30>] (__schedule_loop kernel/sched/core.c:7043 [inline]) [<81a3dd9c>] (__schedule) from [<81a3ed30>] (schedule+0x2c/0x130 kernel/sched/core.c:7058) r10:dfacdd84 r9:00000002 r8:60000113 r7:82916594 r6:dfacdd8c r5:855a5400 r4:855a5400 [<81a3ed04>] (schedule) from [<81a3f118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7115) r5:855a5400 r4:82916590 [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a41978>] (__mutex_lock.constprop.0) from [<81a42470>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfacde08 r4:00000000 [<81a4245c>] (__mutex_lock_slowpath) from [<81a424b0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a42474>] (mutex_lock) from [<804e0660>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85648400 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018205 r8:855a5400 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dfac1000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:85685f8c r4:85639f00 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:ddde2d40 r6:83018200 r5:85685f8c r4:85639f00 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855a5400 r8:85639f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85639f00 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85639f00 r8:8027ade4 r7:df879e60 r6:8563af00 r5:855a5400 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfacdfb0 to 0xdfacdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:85648340 INFO: task kworker/1:60:4302 is blocked on a mutex likely owned by task kworker/0:39:4180. task:kworker/0:39 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3f164>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7288) r10:8280c9b4 r9:856b0000 r8:80200c04 r7:dfebdd54 r6:ffffffff r5:856b0000 r4:00000000 [<81a3f124>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfebdd20 to 0xdfebdd68) dd20: 8775d000 ed7dd000 00000001 80239bb8 7f079000 00000001 82ac8f44 82ac8320 dd40: 7f079000 ed7dd000 8280c9b4 dfebdd9c dfebdda0 dfebdd70 80230af0 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e0424>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82ac8f64 [<804e01a0>] (__purge_vmap_area_lazy) from [<804e07dc>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfebddc0 r5:dfebde08 r4:dfebddc0 [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc15c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:df9cf000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:84eeb38c r4:84fd8500 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:84eeb38c r4:84fd8500 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856b0000 r8:84fd852c r7:82804d40 r6:dddced40 r5:dddced60 r4:84fd8500 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84fd8500 r8:8027ade4 r7:dfe51e60 r6:84da7700 r5:856b0000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfebdfb0 to 0xdfebdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84fd5e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:61:4304 blocked for more than 431 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:61 state:D stack:0 pid:4304 tgid:4304 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3ed30>] (__schedule_loop kernel/sched/core.c:7043 [inline]) [<81a3dd9c>] (__schedule) from [<81a3ed30>] (schedule+0x2c/0x130 kernel/sched/core.c:7058) r10:dfda9d84 r9:00000002 r8:60000013 r7:82916594 r6:dfda9d8c r5:855a6c00 r4:855a6c00 [<81a3ed04>] (schedule) from [<81a3f118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7115) r5:855a6c00 r4:82916590 [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a41978>] (__mutex_lock.constprop.0) from [<81a42470>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfda9e08 r4:00000000 [<81a4245c>] (__mutex_lock_slowpath) from [<81a424b0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a42474>] (mutex_lock) from [<804e0660>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856488c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018205 r8:855a6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dfb19000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:85684b8c r4:85639280 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:ddde2d40 r6:83018200 r5:85684b8c r4:85639280 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855a6c00 r8:856392ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85639280 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85639280 r8:8027ade4 r7:df879e60 r6:8563af80 r5:855a6c00 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfda9fb0 to 0xdfda9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:85648540 INFO: task kworker/1:61:4304 is blocked on a mutex likely owned by task kworker/0:39:4180. task:kworker/0:39 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3f164>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7288) r10:8280c9b4 r9:856b0000 r8:80200c04 r7:dfebdd54 r6:ffffffff r5:856b0000 r4:00000000 [<81a3f124>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfebdd20 to 0xdfebdd68) dd20: 8775d000 ed7dd000 00000001 80239bb8 7f079000 00000001 82ac8f44 82ac8320 dd40: 7f079000 ed7dd000 8280c9b4 dfebdd9c dfebdda0 dfebdd70 80230af0 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e0424>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82ac8f64 [<804e01a0>] (__purge_vmap_area_lazy) from [<804e07dc>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfebddc0 r5:dfebde08 r4:dfebddc0 [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc15c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:df9cf000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:84eeb38c r4:84fd8500 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:84eeb38c r4:84fd8500 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856b0000 r8:84fd852c r7:82804d40 r6:dddced40 r5:dddced60 r4:84fd8500 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84fd8500 r8:8027ade4 r7:dfe51e60 r6:84da7700 r5:856b0000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfebdfb0 to 0xdfebdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84fd5e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:62:4307 blocked for more than 431 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:62 state:D stack:0 pid:4307 tgid:4307 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3ed30>] (__schedule_loop kernel/sched/core.c:7043 [inline]) [<81a3dd9c>] (__schedule) from [<81a3ed30>] (schedule+0x2c/0x130 kernel/sched/core.c:7058) r10:dfe5dd84 r9:00000002 r8:60000113 r7:82916594 r6:dfe5dd8c r5:84e26c00 r4:84e26c00 [<81a3ed04>] (schedule) from [<81a3f118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7115) r5:84e26c00 r4:82916590 [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a41978>] (__mutex_lock.constprop.0) from [<81a42470>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe5de08 r4:00000000 [<81a4245c>] (__mutex_lock_slowpath) from [<81a424b0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a42474>] (mutex_lock) from [<804e0660>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85648b80 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018205 r8:84e26c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dfb2b000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:8568678c r4:85639f80 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:ddde2d40 r6:83018200 r5:8568678c r4:85639f80 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e26c00 r8:85639fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85639f80 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85639f80 r8:8027ade4 r7:dfda9e60 r6:8564d000 r5:84e26c00 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe5dfb0 to 0xdfe5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:85648840 INFO: task kworker/1:62:4307 is blocked on a mutex likely owned by task kworker/0:39:4180. task:kworker/0:39 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3f164>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7288) r10:8280c9b4 r9:856b0000 r8:80200c04 r7:dfebdd54 r6:ffffffff r5:856b0000 r4:00000000 [<81a3f124>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfebdd20 to 0xdfebdd68) dd20: 8775d000 ed7dd000 00000001 80239bb8 7f079000 00000001 82ac8f44 82ac8320 dd40: 7f079000 ed7dd000 8280c9b4 dfebdd9c dfebdda0 dfebdd70 80230af0 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e0424>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82ac8f64 [<804e01a0>] (__purge_vmap_area_lazy) from [<804e07dc>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfebddc0 r5:dfebde08 r4:dfebddc0 [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc15c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:df9cf000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:84eeb38c r4:84fd8500 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:84eeb38c r4:84fd8500 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856b0000 r8:84fd852c r7:82804d40 r6:dddced40 r5:dddced60 r4:84fd8500 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84fd8500 r8:8027ade4 r7:dfe51e60 r6:84da7700 r5:856b0000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfebdfb0 to 0xdfebdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84fd5e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:63:4308 blocked for more than 431 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:63 state:D stack:0 pid:4308 tgid:4308 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3ed30>] (__schedule_loop kernel/sched/core.c:7043 [inline]) [<81a3dd9c>] (__schedule) from [<81a3ed30>] (schedule+0x2c/0x130 kernel/sched/core.c:7058) r10:dfa85d84 r9:00000002 r8:60000013 r7:82916594 r6:dfa85d8c r5:84e25400 r4:84e25400 [<81a3ed04>] (schedule) from [<81a3f118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7115) r5:84e25400 r4:82916590 [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a41978>] (__mutex_lock.constprop.0) from [<81a42470>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa85e08 r4:00000000 [<81a4245c>] (__mutex_lock_slowpath) from [<81a424b0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a42474>] (mutex_lock) from [<804e0660>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855e23c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018205 r8:84e25400 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dfb7f000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:85622f8c r4:8564d200 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:ddde2d40 r6:83018200 r5:85622f8c r4:8564d200 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e25400 r8:8564d22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8564d200 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8564d200 r8:8027ade4 r7:dfe5de60 r6:8564d280 r5:84e25400 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa85fb0 to 0xdfa85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:85648a80 INFO: task kworker/1:63:4308 is blocked on a mutex likely owned by task kworker/0:39:4180. task:kworker/0:39 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3f164>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7288) r10:8280c9b4 r9:856b0000 r8:80200c04 r7:dfebdd54 r6:ffffffff r5:856b0000 r4:00000000 [<81a3f124>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfebdd20 to 0xdfebdd68) dd20: 8775d000 ed7dd000 00000001 80239bb8 7f079000 00000001 82ac8f44 82ac8320 dd40: 7f079000 ed7dd000 8280c9b4 dfebdd9c dfebdda0 dfebdd70 80230af0 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e0424>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82ac8f64 [<804e01a0>] (__purge_vmap_area_lazy) from [<804e07dc>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfebddc0 r5:dfebde08 r4:dfebddc0 [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc15c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:df9cf000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:84eeb38c r4:84fd8500 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:84eeb38c r4:84fd8500 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856b0000 r8:84fd852c r7:82804d40 r6:dddced40 r5:dddced60 r4:84fd8500 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84fd8500 r8:8027ade4 r7:dfe51e60 r6:84da7700 r5:856b0000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfebdfb0 to 0xdfebdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84fd5e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:64:4309 blocked for more than 431 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:64 state:D stack:0 pid:4309 tgid:4309 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3ed30>] (__schedule_loop kernel/sched/core.c:7043 [inline]) [<81a3dd9c>] (__schedule) from [<81a3ed30>] (schedule+0x2c/0x130 kernel/sched/core.c:7058) r10:dfad9d84 r9:00000002 r8:60000113 r7:82916594 r6:dfad9d8c r5:84e26000 r4:84e26000 [<81a3ed04>] (schedule) from [<81a3f118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7115) r5:84e26000 r4:82916590 [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a41978>] (__mutex_lock.constprop.0) from [<81a42470>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfad9e08 r4:00000000 [<81a4245c>] (__mutex_lock_slowpath) from [<81a424b0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a42474>] (mutex_lock) from [<804e0660>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85650840 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018205 r8:84e26000 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dfc19000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:84ed2b8c r4:8564d100 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:ddde2d40 r6:83018200 r5:84ed2b8c r4:8564d100 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e26000 r8:8564d12c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8564d100 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8564d100 r8:8027ade4 r7:dfa85e60 r6:8564d080 r5:84e26000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfad9fb0 to 0xdfad9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:85648d80 INFO: task kworker/1:64:4309 is blocked on a mutex likely owned by task kworker/0:39:4180. task:kworker/0:39 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3f164>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7288) r10:8280c9b4 r9:856b0000 r8:80200c04 r7:dfebdd54 r6:ffffffff r5:856b0000 r4:00000000 [<81a3f124>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfebdd20 to 0xdfebdd68) dd20: 8775d000 ed7dd000 00000001 80239bb8 7f079000 00000001 82ac8f44 82ac8320 dd40: 7f079000 ed7dd000 8280c9b4 dfebdd9c dfebdda0 dfebdd70 80230af0 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e0424>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82ac8f64 [<804e01a0>] (__purge_vmap_area_lazy) from [<804e07dc>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfebddc0 r5:dfebde08 r4:dfebddc0 [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc15c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:df9cf000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:84eeb38c r4:84fd8500 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:84eeb38c r4:84fd8500 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856b0000 r8:84fd852c r7:82804d40 r6:dddced40 r5:dddced60 r4:84fd8500 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84fd8500 r8:8027ade4 r7:dfe51e60 r6:84da7700 r5:856b0000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfebdfb0 to 0xdfebdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84fd5e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:65:4315 blocked for more than 431 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:65 state:D stack:0 pid:4315 tgid:4315 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3ed30>] (__schedule_loop kernel/sched/core.c:7043 [inline]) [<81a3dd9c>] (__schedule) from [<81a3ed30>] (schedule+0x2c/0x130 kernel/sched/core.c:7058) r10:dfb89d84 r9:00000002 r8:60000013 r7:82916594 r6:dfb89d8c r5:856d8000 r4:856d8000 [<81a3ed04>] (schedule) from [<81a3f118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7115) r5:856d8000 r4:82916590 [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a41978>] (__mutex_lock.constprop.0) from [<81a42470>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb89e08 r4:00000000 [<81a4245c>] (__mutex_lock_slowpath) from [<81a424b0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a42474>] (mutex_lock) from [<804e0660>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85650080 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018205 r8:856d8000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dfba1000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:85686f8c r4:8564d300 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:ddde2d40 r6:83018200 r5:85686f8c r4:8564d300 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856d8000 r8:8564d32c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8564d300 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8564d300 r8:8027ade4 r7:dfad9e60 r6:8564d400 r5:856d8000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb89fb0 to 0xdfb89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84f33f80 INFO: task kworker/1:65:4315 is blocked on a mutex likely owned by task kworker/0:39:4180. task:kworker/0:39 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3f164>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7288) r10:8280c9b4 r9:856b0000 r8:80200c04 r7:dfebdd54 r6:ffffffff r5:856b0000 r4:00000000 [<81a3f124>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfebdd20 to 0xdfebdd68) dd20: 8775d000 ed7dd000 00000001 80239bb8 7f079000 00000001 82ac8f44 82ac8320 dd40: 7f079000 ed7dd000 8280c9b4 dfebdd9c dfebdda0 dfebdd70 80230af0 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e0424>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82ac8f64 [<804e01a0>] (__purge_vmap_area_lazy) from [<804e07dc>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfebddc0 r5:dfebde08 r4:dfebddc0 [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc15c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:df9cf000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:84eeb38c r4:84fd8500 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:84eeb38c r4:84fd8500 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856b0000 r8:84fd852c r7:82804d40 r6:dddced40 r5:dddced60 r4:84fd8500 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84fd8500 r8:8027ade4 r7:dfe51e60 r6:84da7700 r5:856b0000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfebdfb0 to 0xdfebdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84fd5e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:66:4316 blocked for more than 431 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:66 state:D stack:0 pid:4316 tgid:4316 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3ed30>] (__schedule_loop kernel/sched/core.c:7043 [inline]) [<81a3dd9c>] (__schedule) from [<81a3ed30>] (schedule+0x2c/0x130 kernel/sched/core.c:7058) r10:dfbb9d84 r9:00000002 r8:60000113 r7:82916594 r6:dfbb9d8c r5:856d8c00 r4:856d8c00 [<81a3ed04>] (schedule) from [<81a3f118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7115) r5:856d8c00 r4:82916590 [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a41978>] (__mutex_lock.constprop.0) from [<81a42470>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbb9e08 r4:00000000 [<81a4245c>] (__mutex_lock_slowpath) from [<81a424b0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a42474>] (mutex_lock) from [<804e0660>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85650340 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018205 r8:856d8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dfbc1000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:85687b8c r4:8564d580 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:ddde2d40 r6:83018200 r5:85687b8c r4:8564d580 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856d8c00 r8:8564d5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8564d580 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8564d580 r8:8027ade4 r7:dfad9e60 r6:8564d600 r5:856d8c00 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbb9fb0 to 0xdfbb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:856503c0 INFO: task kworker/1:66:4316 is blocked on a mutex likely owned by task kworker/0:39:4180. task:kworker/0:39 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3f164>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7288) r10:8280c9b4 r9:856b0000 r8:80200c04 r7:dfebdd54 r6:ffffffff r5:856b0000 r4:00000000 [<81a3f124>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfebdd20 to 0xdfebdd68) dd20: 87d02000 ed7dd000 00000001 80239bb8 7f079000 00000001 82ac8f44 82ac8320 dd40: 7f079000 ed7dd000 8280c9b4 dfebdd9c dfebdda0 dfebdd70 80230af0 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e0424>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82ac8f64 [<804e01a0>] (__purge_vmap_area_lazy) from [<804e07dc>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfebddc0 r5:dfebde08 r4:dfebddc0 [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc15c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:df9cf000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:84eeb38c r4:84fd8500 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:84eeb38c r4:84fd8500 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856b0000 r8:84fd852c r7:82804d40 r6:dddced40 r5:dddced60 r4:84fd8500 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84fd8500 r8:8027ade4 r7:dfe51e60 r6:84da7700 r5:856b0000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfebdfb0 to 0xdfebdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84fd5e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:67:4318 blocked for more than 431 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:67 state:D stack:0 pid:4318 tgid:4318 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3ed30>] (__schedule_loop kernel/sched/core.c:7043 [inline]) [<81a3dd9c>] (__schedule) from [<81a3ed30>] (schedule+0x2c/0x130 kernel/sched/core.c:7058) r10:dfc01d84 r9:00000002 r8:60000113 r7:82916594 r6:dfc01d8c r5:856d9800 r4:856d9800 [<81a3ed04>] (schedule) from [<81a3f118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7115) r5:856d9800 r4:82916590 [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a41978>] (__mutex_lock.constprop.0) from [<81a42470>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc01e08 r4:00000000 [<81a4245c>] (__mutex_lock_slowpath) from [<81a424b0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a42474>] (mutex_lock) from [<804e0660>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85650580 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018205 r8:856d9800 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dfbe9000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:85687f8c r4:8564d500 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:ddde2d40 r6:83018200 r5:85687f8c r4:8564d500 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856d9800 r8:8564d52c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8564d500 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8564d500 r8:8027ade4 r7:dfad9e60 r6:8564d480 r5:856d9800 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc01fb0 to 0xdfc01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:85650240 INFO: task kworker/1:67:4318 is blocked on a mutex likely owned by task kworker/0:39:4180. task:kworker/0:39 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3f164>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7288) r10:8280c9b4 r9:856b0000 r8:80200c04 r7:dfebdd54 r6:ffffffff r5:856b0000 r4:00000000 [<81a3f124>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfebdd20 to 0xdfebdd68) dd20: 8800a000 ed7dd000 00000001 80239bb8 7f079000 00000001 82ac8f44 82ac8320 dd40: 7f079000 ed7dd000 8280c9b4 dfebdd9c dfebdda0 dfebdd70 80230af0 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e0424>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82ac8f64 [<804e01a0>] (__purge_vmap_area_lazy) from [<804e07dc>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfebddc0 r5:dfebde08 r4:dfebddc0 [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc15c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:df9cf000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:84eeb38c r4:84fd8500 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:84eeb38c r4:84fd8500 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856b0000 r8:84fd852c r7:82804d40 r6:dddced40 r5:dddced60 r4:84fd8500 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84fd8500 r8:8027ade4 r7:dfe51e60 r6:84da7700 r5:856b0000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfebdfb0 to 0xdfebdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84fd5e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:68:4320 blocked for more than 431 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:68 state:D stack:0 pid:4320 tgid:4320 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3ed30>] (__schedule_loop kernel/sched/core.c:7043 [inline]) [<81a3dd9c>] (__schedule) from [<81a3ed30>] (schedule+0x2c/0x130 kernel/sched/core.c:7058) r10:dfe61d84 r9:00000002 r8:60000013 r7:82916594 r6:dfe61d8c r5:856db000 r4:856db000 [<81a3ed04>] (schedule) from [<81a3f118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7115) r5:856db000 r4:82916590 [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a41978>] (__mutex_lock.constprop.0) from [<81a42470>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe61e08 r4:00000000 [<81a4245c>] (__mutex_lock_slowpath) from [<81a424b0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a42474>] (mutex_lock) from [<804e0660>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85650c40 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018205 r8:856db000 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dfc5e000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:8567738c r4:8564d680 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:ddde2d40 r6:83018200 r5:8567738c r4:8564d680 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856db000 r8:8564d6ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8564d680 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8564d680 r8:8027ade4 r7:dfad9e60 r6:8564d700 r5:856db000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe61fb0 to 0xdfe61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:85650740 INFO: task kworker/1:68:4320 is blocked on a mutex likely owned by task kworker/0:39:4180. task:kworker/0:39 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3f164>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7288) r10:8280c9b4 r9:856b0000 r8:80200c04 r7:dfebdd54 r6:ffffffff r5:856b0000 r4:00000000 [<81a3f124>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfebdd20 to 0xdfebdd68) dd20: 8800a000 ed7dd000 00000001 80239bb8 7f079000 00000001 82ac8f44 82ac8320 dd40: 7f079000 ed7dd000 8280c9b4 dfebdd9c dfebdda0 dfebdd70 80230af0 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e0424>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82ac8f64 [<804e01a0>] (__purge_vmap_area_lazy) from [<804e07dc>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfebddc0 r5:dfebde08 r4:dfebddc0 [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc15c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:df9cf000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:84eeb38c r4:84fd8500 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:84eeb38c r4:84fd8500 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856b0000 r8:84fd852c r7:82804d40 r6:dddced40 r5:dddced60 r4:84fd8500 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84fd8500 r8:8027ade4 r7:dfe51e60 r6:84da7700 r5:856b0000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfebdfb0 to 0xdfebdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84fd5e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:69:4321 blocked for more than 431 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:69 state:D stack:0 pid:4321 tgid:4321 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3ed30>] (__schedule_loop kernel/sched/core.c:7043 [inline]) [<81a3dd9c>] (__schedule) from [<81a3ed30>] (schedule+0x2c/0x130 kernel/sched/core.c:7058) r10:dfcb5d84 r9:00000002 r8:60000013 r7:82916594 r6:dfcb5d8c r5:856dbc00 r4:856dbc00 [<81a3ed04>] (schedule) from [<81a3f118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7115) r5:856dbc00 r4:82916590 [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3f100>] (schedule_preempt_disabled) from [<81a41cc8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a41978>] (__mutex_lock.constprop.0) from [<81a42470>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcb5e08 r4:00000000 [<81a4245c>] (__mutex_lock_slowpath) from [<81a424b0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a42474>] (mutex_lock) from [<804e0660>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85650980 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018205 r8:856dbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:dfc37000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:84ed378c r4:8564d780 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:ddde2d40 r6:83018200 r5:84ed378c r4:8564d780 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856dbc00 r8:8564d7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8564d780 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8564d780 r8:8027ade4 r7:dfe61e60 r6:8564d800 r5:856dbc00 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcb5fb0 to 0xdfcb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:85650540 INFO: task kworker/1:69:4321 is blocked on a mutex likely owned by task kworker/0:39:4180. task:kworker/0:39 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3dd9c>] (__schedule) from [<81a3f164>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7288) r10:8280c9b4 r9:856b0000 r8:80200c04 r7:dfebdd54 r6:ffffffff r5:856b0000 r4:00000000 [<81a3f124>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfebdd20 to 0xdfebdd68) dd20: 8819c000 ed7dd000 00000001 80239bb8 7f079000 00000001 82ac8f44 82ac8320 dd40: 7f079000 ed7dd000 8280c9b4 dfebdd9c dfebdda0 dfebdd70 80230af0 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e0424>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82ac8f64 [<804e01a0>] (__purge_vmap_area_lazy) from [<804e07dc>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfebddc0 r5:dfebde08 r4:dfebddc0 [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e05f8>] (_vm_unmap_aliases) from [<804e4440>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc15c0 r4:00000000 [<804e42d4>] (vfree) from [<8054d180>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:856b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<8054d150>] (execmem_free) from [<803c32b8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:df9cf000 [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c32a8>] (bpf_jit_free_exec) from [<803c3698>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c3630>] (bpf_jit_free) from [<803c4740>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2925) r5:84eeb38c r4:84fd8500 [<803c4600>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:84eeb38c r4:84fd8500 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856b0000 r8:84fd852c r7:82804d40 r6:dddced40 r5:dddced60 r4:84fd8500 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84fd8500 r8:8027ade4 r7:dfe51e60 r6:84da7700 r5:856b0000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfebdfb0 to 0xdfebdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84fd5e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 32 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT Hardware name: ARM-Versatile Express Call trace: [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c arch/arm/kernel/traps.c:257) r7:00000000 r6:000e0013 r5:600e0093 r4:82260d4c [<80201b08>] (show_stack) from [<8021fc6c>] (__dump_stack lib/dump_stack.c:94 [inline]) [<80201b08>] (show_stack) from [<8021fc6c>] (dump_stack_lvl+0x70/0x7c lib/dump_stack.c:120) [<8021fbfc>] (dump_stack_lvl) from [<8021fc90>] (dump_stack+0x18/0x1c lib/dump_stack.c:129) r5:00000000 r4:00000001 [<8021fc78>] (dump_stack) from [<81a279b0>] (nmi_cpu_backtrace+0x160/0x17c lib/nmi_backtrace.c:113) [<81a27850>] (nmi_cpu_backtrace) from [<81a27afc>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8 lib/nmi_backtrace.c:62) r7:00000000 r6:8280c690 r5:8281ac94 r4:ffffffff [<81a279cc>] (nmi_trigger_cpumask_backtrace) from [<802304fc>] (arch_trigger_cpumask_backtrace+0x18/0x1c arch/arm/kernel/smp.c:852) r9:82abd56c r8:82804d40 r7:00008e76 r6:0000777f r5:8281b248 r4:863c480c [<802304e4>] (arch_trigger_cpumask_backtrace) from [<8037d958>] (trigger_all_cpu_backtrace include/linux/nmi.h:160 [inline]) [<802304e4>] (arch_trigger_cpumask_backtrace) from [<8037d958>] (check_hung_uninterruptible_tasks kernel/hung_task.c:328 [inline]) [<802304e4>] (arch_trigger_cpumask_backtrace) from [<8037d958>] (watchdog+0x4d4/0x81c kernel/hung_task.c:491) [<8037d484>] (watchdog) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:00000000 r8:8037d484 r7:832a2200 r6:832a2200 r5:832eb000 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf8e1fb0 to 0xdf8e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:8334b980 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 2842 Comm: pr/ttyAMA-1 Not tainted syzkaller #0 PREEMPT Hardware name: ARM-Versatile Express PC is at __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:152 [inline] PC is at _raw_spin_unlock_irqrestore+0x28/0x54 kernel/locking/spinlock.c:194 LR is at spin_unlock_irqrestore include/linux/spinlock.h:406 [inline] LR is at __uart_port_unlock_irqrestore include/linux/serial_core.h:616 [inline] LR is at pl011_console_device_unlock+0x20/0x24 drivers/tty/serial/amba-pl011.c:2603 pc : [<81a47d64>] lr : [<80a7a000>] psr: 60000113 sp : eb809eb0 ip : eb809ec0 fp : eb809ebc r10: 82959154 r9 : 00000001 r8 : 00000000 r7 : 00000117 r6 : 829590b8 r5 : 00000000 r4 : 00000001 r3 : 000010ea r2 : 00000000 r1 : 60000113 r0 : 849f2c40 Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none Control: 30c5387d Table: 860368c0 DAC: 00000000 Call trace: [<81a47d3c>] (_raw_spin_unlock_irqrestore) from [<80a7a000>] (spin_unlock_irqrestore include/linux/spinlock.h:406 [inline]) [<81a47d3c>] (_raw_spin_unlock_irqrestore) from [<80a7a000>] (__uart_port_unlock_irqrestore include/linux/serial_core.h:616 [inline]) [<81a47d3c>] (_raw_spin_unlock_irqrestore) from [<80a7a000>] (pl011_console_device_unlock+0x20/0x24 drivers/tty/serial/amba-pl011.c:2603) [<80a79fe0>] (pl011_console_device_unlock) from [<802e456c>] (nbcon_emit_one+0x88/0x100 kernel/printk/nbcon.c:1142) [<802e44e4>] (nbcon_emit_one) from [<802e478c>] (nbcon_kthread_func+0x1a8/0x2a4 kernel/printk/nbcon.c:1229) r6:8280c690 r5:83aa3c00 r4:829590b8 [<802e45e4>] (nbcon_kthread_func) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:829590b8 r8:802e45e4 r7:84b37b00 r6:84b37b00 r5:83aa3c00 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb809fb0 to 0xeb809ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84b27280