INFO: task kworker/0:14:5219 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:14 state:D stack:0 pid:5219 tgid:5219 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81b04afc>] (__schedule) from [<81b05f8c>] (__schedule_loop kernel/sched/core.c:7267 [inline]) [<81b04afc>] (__schedule) from [<81b05f8c>] (schedule+0x2c/0x134 kernel/sched/core.c:7282) r10:dfbc9da4 r9:dfbc9dac r8:00000002 r7:60000013 r6:82ccfb50 r5:84006200 r4:84006200 [<81b05f60>] (schedule) from [<81b06118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7339) r5:84006200 r4:82ccfb4c [<81b06100>] (schedule_preempt_disabled) from [<81b091f4>] (__mutex_lock_common kernel/locking/mutex.c:712 [inline]) [<81b06100>] (schedule_preempt_disabled) from [<81b091f4>] (__mutex_lock.constprop.0+0x530/0xa88 kernel/locking/mutex.c:806) [<81b08cc4>] (__mutex_lock.constprop.0) from [<81b09820>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1100) r10:82a0b82c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbc9e28 r4:00000000 [<81b0980c>] (__mutex_lock_slowpath) from [<81b09860>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:305) [<81b09824>] (mutex_lock) from [<8050716c>] (_vm_unmap_aliases+0x5c/0x238 mm/vmalloc.c:2951) [<80507110>] (_vm_unmap_aliases) from [<8050af60>] (vm_reset_perms mm/vmalloc.c:3382 [inline]) [<80507110>] (_vm_unmap_aliases) from [<8050af60>] (vfree+0x168/0x1d8 mm/vmalloc.c:3461) r10:8302b005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:860a4100 r4:00000000 [<8050adf8>] (vfree) from [<8057a740>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:84006200 r8:00800000 r7:00000000 r6:8302b000 r5:00001000 r4:7f075000 [<8057a710>] (execmem_free) from [<803d0c3c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1070) r5:00001000 r4:ea789000 [<803d0c2c>] (bpf_jit_free_exec) from [<803d101c>] (bpf_jit_binary_free kernel/bpf/core.c:1116 [inline]) [<803d0c2c>] (bpf_jit_free_exec) from [<803d101c>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1239) [<803d0fb8>] (bpf_jit_free) from [<803d20c4>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:3029) r5:8600bf8c r4:8600bf8c [<803d1f7c>] (bpf_prog_free_deferred) from [<80276360>] (process_one_work+0x1c8/0x5a0 kernel/workqueue.c:3302) r7:dddd0e00 r6:8302b000 r5:8600bf8c r4:864b4500 [<80276198>] (process_one_work) from [<80277124>] (process_scheduled_works kernel/workqueue.c:3385 [inline]) [<80276198>] (process_one_work) from [<80277124>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3466) r10:00000000 r9:864b4530 r8:84006200 r7:82a03d80 r6:dddd0e20 r5:dddd0e00 r4:864b4500 [<80276fb8>] (worker_thread) from [<8028117c>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:dfa8de88 r8:864b4280 r7:864b4500 r6:80276fb8 r5:84006200 r4:86200980 [<80281060>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbc9fb0 to 0xdfbc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281060 r4:86200980 INFO: task kworker/0:14:5219 is blocked on a mutex likely owned by task kworker/1:276:8529. task:kworker/1:276 state:R running task stack:0 pid:8529 tgid:8529 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81b04afc>] (__schedule) from [<81b063c4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7512) r10:82a0b880 r9:86553d40 r8:80200c04 r7:ead3dd7c r6:ffffffff r5:86553d40 r4:00000000 [<81b06384>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xead3dd48 to 0xead3dd90) dd40: a3cc1000 edf57000 00000000 80238790 82cceee0 82ccfb24 dd60: 7f0db000 edf57000 00000000 00000001 82a0b880 ead3ddbc edf57000 ead3dd98 dd80: 8022f6e0 802387a8 80000013 ffffffff r5:80000013 r4:802387a8 [<8022f680>] (flush_tlb_kernel_range) from [<80506f20>] (__purge_vmap_area_lazy+0x294/0x484 mm/vmalloc.c:2376) [<80506c8c>] (__purge_vmap_area_lazy) from [<805072f8>] (_vm_unmap_aliases+0x1e8/0x238 mm/vmalloc.c:2990) r10:00000000 r9:ead3dde0 r8:00000000 r7:ffffffff r6:00000008 r5:ead3de28 r4:ead3dde0 [<80507110>] (_vm_unmap_aliases) from [<8050af60>] (vm_reset_perms mm/vmalloc.c:3382 [inline]) [<80507110>] (_vm_unmap_aliases) from [<8050af60>] (vfree+0x168/0x1d8 mm/vmalloc.c:3461) r10:8302ae05 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:861f4b00 r4:00000000 [<8050adf8>] (vfree) from [<8057a740>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:86553d40 r8:01800000 r7:00000000 r6:8302ae00 r5:00001000 r4:7f06f000 [<8057a710>] (execmem_free) from [<803d0c3c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1070) r5:00001000 r4:ea41f000 [<803d0c2c>] (bpf_jit_free_exec) from [<803d101c>] (bpf_jit_binary_free kernel/bpf/core.c:1116 [inline]) [<803d0c2c>] (bpf_jit_free_exec) from [<803d101c>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1239) [<803d0fb8>] (bpf_jit_free) from [<803d20c4>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:3029) r5:86129b8c r4:86129b8c [<803d1f7c>] (bpf_prog_free_deferred) from [<80276360>] (process_one_work+0x1c8/0x5a0 kernel/workqueue.c:3302) r7:ddde4e00 r6:8302ae00 r5:86129b8c r4:85930800 [<80276198>] (process_one_work) from [<80277124>] (process_scheduled_works kernel/workqueue.c:3385 [inline]) [<80276198>] (process_one_work) from [<80277124>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3466) r10:ddde4e00 r9:85930830 r8:86553d40 r7:82a03d80 r6:ddde4e20 r5:ddde4e00 r4:85930800 [<80276fb8>] (worker_thread) from [<8028117c>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:ead31e88 r8:85930780 r7:85930800 r6:80276fb8 r5:86553d40 r4:85cc5d00 [<80281060>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead3dfb0 to 0xead3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281060 r4:85cc5d00 INFO: task kworker/0:83:5736 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:83 state:D stack:0 pid:5736 tgid:5736 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81b04afc>] (__schedule) from [<81b05f8c>] (__schedule_loop kernel/sched/core.c:7267 [inline]) [<81b04afc>] (__schedule) from [<81b05f8c>] (schedule+0x2c/0x134 kernel/sched/core.c:7282) r10:e8349da4 r9:e8349dac r8:00000002 r7:60000013 r6:82ccfb50 r5:860fb100 r4:860fb100 [<81b05f60>] (schedule) from [<81b06118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7339) r5:860fb100 r4:82ccfb4c [<81b06100>] (schedule_preempt_disabled) from [<81b091f4>] (__mutex_lock_common kernel/locking/mutex.c:712 [inline]) [<81b06100>] (schedule_preempt_disabled) from [<81b091f4>] (__mutex_lock.constprop.0+0x530/0xa88 kernel/locking/mutex.c:806) [<81b08cc4>] (__mutex_lock.constprop.0) from [<81b09820>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1100) r10:82a0b82c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8349e28 r4:00000000 [<81b0980c>] (__mutex_lock_slowpath) from [<81b09860>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:305) [<81b09824>] (mutex_lock) from [<8050716c>] (_vm_unmap_aliases+0x5c/0x238 mm/vmalloc.c:2951) [<80507110>] (_vm_unmap_aliases) from [<8050af60>] (vm_reset_perms mm/vmalloc.c:3382 [inline]) [<80507110>] (_vm_unmap_aliases) from [<8050af60>] (vfree+0x168/0x1d8 mm/vmalloc.c:3461) r10:8302b005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e3cc40 r4:00000000 [<8050adf8>] (vfree) from [<8057a740>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:860fb100 r8:00800000 r7:00000000 r6:8302b000 r5:00001000 r4:7f05d000 [<8057a710>] (execmem_free) from [<803d0c3c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1070) r5:00001000 r4:e0034000 [<803d0c2c>] (bpf_jit_free_exec) from [<803d101c>] (bpf_jit_binary_free kernel/bpf/core.c:1116 [inline]) [<803d0c2c>] (bpf_jit_free_exec) from [<803d101c>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1239) [<803d0fb8>] (bpf_jit_free) from [<803d20c4>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:3029) r5:865a0b8c r4:865a0b8c [<803d1f7c>] (bpf_prog_free_deferred) from [<80276360>] (process_one_work+0x1c8/0x5a0 kernel/workqueue.c:3302) r7:dddd0e00 r6:8302b000 r5:865a0b8c r4:86225380 [<80276198>] (process_one_work) from [<80277124>] (process_scheduled_works kernel/workqueue.c:3385 [inline]) [<80276198>] (process_one_work) from [<80277124>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3466) r10:00000000 r9:862253b0 r8:860fb100 r7:82a03d80 r6:dddd0e20 r5:dddd0e00 r4:86225380 [<80276fb8>] (worker_thread) from [<8028117c>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:e8309e88 r8:86225300 r7:86225380 r6:80276fb8 r5:860fb100 r4:8622ea00 [<80281060>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8349fb0 to 0xe8349ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281060 r4:8622ea00 INFO: task kworker/0:83:5736 is blocked on a mutex likely owned by task kworker/1:276:8529. task:kworker/1:276 state:R running task stack:0 pid:8529 tgid:8529 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81b04afc>] (__schedule) from [<81b063c4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7512) r10:82a0b880 r9:86553d40 r8:80200c04 r7:ead3dd7c r6:ffffffff r5:86553d40 r4:00000000 [<81b06384>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xead3dd48 to 0xead3dd90) dd40: a46c5000 edf57000 00000000 80238790 82cceee0 82ccfb24 dd60: 7f0db000 edf57000 00000000 00000001 82a0b880 ead3ddbc edf57000 ead3dd98 dd80: 8022f6e0 802387a8 80000013 ffffffff r5:80000013 r4:802387a8 [<8022f680>] (flush_tlb_kernel_range) from [<80506f20>] (__purge_vmap_area_lazy+0x294/0x484 mm/vmalloc.c:2376) [<80506c8c>] (__purge_vmap_area_lazy) from [<805072f8>] (_vm_unmap_aliases+0x1e8/0x238 mm/vmalloc.c:2990) r10:00000000 r9:ead3dde0 r8:00000000 r7:ffffffff r6:00000008 r5:ead3de28 r4:ead3dde0 [<80507110>] (_vm_unmap_aliases) from [<8050af60>] (vm_reset_perms mm/vmalloc.c:3382 [inline]) [<80507110>] (_vm_unmap_aliases) from [<8050af60>] (vfree+0x168/0x1d8 mm/vmalloc.c:3461) r10:8302ae05 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:861f4b00 r4:00000000 [<8050adf8>] (vfree) from [<8057a740>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:86553d40 r8:01800000 r7:00000000 r6:8302ae00 r5:00001000 r4:7f06f000 [<8057a710>] (execmem_free) from [<803d0c3c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1070) r5:00001000 r4:ea41f000 [<803d0c2c>] (bpf_jit_free_exec) from [<803d101c>] (bpf_jit_binary_free kernel/bpf/core.c:1116 [inline]) [<803d0c2c>] (bpf_jit_free_exec) from [<803d101c>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1239) [<803d0fb8>] (bpf_jit_free) from [<803d20c4>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:3029) r5:86129b8c r4:86129b8c [<803d1f7c>] (bpf_prog_free_deferred) from [<80276360>] (process_one_work+0x1c8/0x5a0 kernel/workqueue.c:3302) r7:ddde4e00 r6:8302ae00 r5:86129b8c r4:85930800 [<80276198>] (process_one_work) from [<80277124>] (process_scheduled_works kernel/workqueue.c:3385 [inline]) [<80276198>] (process_one_work) from [<80277124>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3466) r10:ddde4e00 r9:85930830 r8:86553d40 r7:82a03d80 r6:ddde4e20 r5:ddde4e00 r4:85930800 [<80276fb8>] (worker_thread) from [<8028117c>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:ead31e88 r8:85930780 r7:85930800 r6:80276fb8 r5:86553d40 r4:85cc5d00 [<80281060>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead3dfb0 to 0xead3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281060 r4:85cc5d00 INFO: task kworker/0:271:6643 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:271 state:D stack:0 pid:6643 tgid:6643 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81b04afc>] (__schedule) from [<81b05f8c>] (__schedule_loop kernel/sched/core.c:7267 [inline]) [<81b04afc>] (__schedule) from [<81b05f8c>] (schedule+0x2c/0x134 kernel/sched/core.c:7282) r10:eaa39da4 r9:eaa39dac r8:00000002 r7:60000013 r6:82ccfb50 r5:86191880 r4:86191880 [<81b05f60>] (schedule) from [<81b06118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7339) r5:86191880 r4:82ccfb4c [<81b06100>] (schedule_preempt_disabled) from [<81b091f4>] (__mutex_lock_common kernel/locking/mutex.c:712 [inline]) [<81b06100>] (schedule_preempt_disabled) from [<81b091f4>] (__mutex_lock.constprop.0+0x530/0xa88 kernel/locking/mutex.c:806) [<81b08cc4>] (__mutex_lock.constprop.0) from [<81b09820>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1100) r10:82a0b82c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa39e28 r4:00000000 [<81b0980c>] (__mutex_lock_slowpath) from [<81b09860>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:305) [<81b09824>] (mutex_lock) from [<8050716c>] (_vm_unmap_aliases+0x5c/0x238 mm/vmalloc.c:2951) [<80507110>] (_vm_unmap_aliases) from [<8050af60>] (vm_reset_perms mm/vmalloc.c:3382 [inline]) [<80507110>] (_vm_unmap_aliases) from [<8050af60>] (vfree+0x168/0x1d8 mm/vmalloc.c:3461) r10:8302b005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e3c380 r4:00000000 [<8050adf8>] (vfree) from [<8057a740>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:86191880 r8:00800000 r7:00000000 r6:8302b000 r5:00001000 r4:7f057000 [<8057a710>] (execmem_free) from [<803d0c3c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1070) r5:00001000 r4:dfb6f000 [<803d0c2c>] (bpf_jit_free_exec) from [<803d101c>] (bpf_jit_binary_free kernel/bpf/core.c:1116 [inline]) [<803d0c2c>] (bpf_jit_free_exec) from [<803d101c>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1239) [<803d0fb8>] (bpf_jit_free) from [<803d20c4>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:3029) r5:86387f8c r4:86387f8c [<803d1f7c>] (bpf_prog_free_deferred) from [<80276360>] (process_one_work+0x1c8/0x5a0 kernel/workqueue.c:3302) r7:dddd0e00 r6:8302b000 r5:86387f8c r4:86154800 [<80276198>] (process_one_work) from [<80277124>] (process_scheduled_works kernel/workqueue.c:3385 [inline]) [<80276198>] (process_one_work) from [<80277124>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3466) r10:dddd0e00 r9:86154830 r8:86191880 r7:82a03d80 r6:dddd0e20 r5:dddd0e00 r4:86154800 [<80276fb8>] (worker_thread) from [<8028117c>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:eaadde88 r8:86154700 r7:86154800 r6:80276fb8 r5:86191880 r4:8615a840 [<80281060>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa39fb0 to 0xeaa39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281060 r4:8615a840 INFO: task kworker/0:271:6643 is blocked on a mutex likely owned by task kworker/1:276:8529. task:kworker/1:276 state:R running task stack:0 pid:8529 tgid:8529 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81b04afc>] (__schedule) from [<81b063c4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7512) r10:82a0b880 r9:86553d40 r8:80200c04 r7:ead3dd7c r6:ffffffff r5:86553d40 r4:00000000 [<81b06384>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xead3dd48 to 0xead3dd90) dd40: a4f6a000 edf57000 00000000 80238790 82cceee0 82ccfb24 dd60: 7f0db000 edf57000 00000000 00000001 82a0b880 ead3ddbc edf57000 ead3dd98 dd80: 8022f6e0 802387a8 80000013 ffffffff r5:80000013 r4:802387a8 [<8022f680>] (flush_tlb_kernel_range) from [<80506f20>] (__purge_vmap_area_lazy+0x294/0x484 mm/vmalloc.c:2376) [<80506c8c>] (__purge_vmap_area_lazy) from [<805072f8>] (_vm_unmap_aliases+0x1e8/0x238 mm/vmalloc.c:2990) r10:00000000 r9:ead3dde0 r8:00000000 r7:ffffffff r6:00000008 r5:ead3de28 r4:ead3dde0 [<80507110>] (_vm_unmap_aliases) from [<8050af60>] (vm_reset_perms mm/vmalloc.c:3382 [inline]) [<80507110>] (_vm_unmap_aliases) from [<8050af60>] (vfree+0x168/0x1d8 mm/vmalloc.c:3461) r10:8302ae05 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:861f4b00 r4:00000000 [<8050adf8>] (vfree) from [<8057a740>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:86553d40 r8:01800000 r7:00000000 r6:8302ae00 r5:00001000 r4:7f06f000 [<8057a710>] (execmem_free) from [<803d0c3c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1070) r5:00001000 r4:ea41f000 [<803d0c2c>] (bpf_jit_free_exec) from [<803d101c>] (bpf_jit_binary_free kernel/bpf/core.c:1116 [inline]) [<803d0c2c>] (bpf_jit_free_exec) from [<803d101c>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1239) [<803d0fb8>] (bpf_jit_free) from [<803d20c4>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:3029) r5:86129b8c r4:86129b8c [<803d1f7c>] (bpf_prog_free_deferred) from [<80276360>] (process_one_work+0x1c8/0x5a0 kernel/workqueue.c:3302) r7:ddde4e00 r6:8302ae00 r5:86129b8c r4:85930800 [<80276198>] (process_one_work) from [<80277124>] (process_scheduled_works kernel/workqueue.c:3385 [inline]) [<80276198>] (process_one_work) from [<80277124>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3466) r10:ddde4e00 r9:85930830 r8:86553d40 r7:82a03d80 r6:ddde4e20 r5:ddde4e00 r4:85930800 [<80276fb8>] (worker_thread) from [<8028117c>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:ead31e88 r8:85930780 r7:85930800 r6:80276fb8 r5:86553d40 r4:85cc5d00 [<80281060>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead3dfb0 to 0xead3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281060 r4:85cc5d00 INFO: task kworker/0:315:6801 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:315 state:D stack:0 pid:6801 tgid:6801 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81b04afc>] (__schedule) from [<81b05f8c>] (__schedule_loop kernel/sched/core.c:7267 [inline]) [<81b04afc>] (__schedule) from [<81b05f8c>] (schedule+0x2c/0x134 kernel/sched/core.c:7282) r10:eab95da4 r9:eab95dac r8:00000002 r7:60000113 r6:82ccfb50 r5:8653ee40 r4:8653ee40 [<81b05f60>] (schedule) from [<81b06118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7339) r5:8653ee40 r4:82ccfb4c [<81b06100>] (schedule_preempt_disabled) from [<81b091f4>] (__mutex_lock_common kernel/locking/mutex.c:712 [inline]) [<81b06100>] (schedule_preempt_disabled) from [<81b091f4>] (__mutex_lock.constprop.0+0x530/0xa88 kernel/locking/mutex.c:806) [<81b08cc4>] (__mutex_lock.constprop.0) from [<81b09820>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1100) r10:82a0b82c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab95e28 r4:00000000 [<81b0980c>] (__mutex_lock_slowpath) from [<81b09860>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:305) [<81b09824>] (mutex_lock) from [<8050716c>] (_vm_unmap_aliases+0x5c/0x238 mm/vmalloc.c:2951) [<80507110>] (_vm_unmap_aliases) from [<8050af60>] (vm_reset_perms mm/vmalloc.c:3382 [inline]) [<80507110>] (_vm_unmap_aliases) from [<8050af60>] (vfree+0x168/0x1d8 mm/vmalloc.c:3461) r10:8302b005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e3c300 r4:00000000 [<8050adf8>] (vfree) from [<8057a740>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:8653ee40 r8:00800000 r7:00000000 r6:8302b000 r5:00001000 r4:7f073000 [<8057a710>] (execmem_free) from [<803d0c3c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1070) r5:00001000 r4:e0249000 [<803d0c2c>] (bpf_jit_free_exec) from [<803d101c>] (bpf_jit_binary_free kernel/bpf/core.c:1116 [inline]) [<803d0c2c>] (bpf_jit_free_exec) from [<803d101c>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1239) [<803d0fb8>] (bpf_jit_free) from [<803d20c4>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:3029) r5:865a038c r4:865a038c [<803d1f7c>] (bpf_prog_free_deferred) from [<80276360>] (process_one_work+0x1c8/0x5a0 kernel/workqueue.c:3302) r7:dddd0e00 r6:8302b000 r5:865a038c r4:86163480 [<80276198>] (process_one_work) from [<80277124>] (process_scheduled_works kernel/workqueue.c:3385 [inline]) [<80276198>] (process_one_work) from [<80277124>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3466) r10:00000000 r9:861634b0 r8:8653ee40 r7:82a03d80 r6:dddd0e20 r5:dddd0e00 r4:86163480 [<80276fb8>] (worker_thread) from [<8028117c>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:eab79e88 r8:86163000 r7:86163480 r6:80276fb8 r5:8653ee40 r4:86166000 [<80281060>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab95fb0 to 0xeab95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281060 r4:86166000 INFO: task kworker/0:315:6801 is blocked on a mutex likely owned by task kworker/1:276:8529. task:kworker/1:276 state:R running task stack:0 pid:8529 tgid:8529 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81b04afc>] (__schedule) from [<81b063c4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7512) r10:82a0b880 r9:86553d40 r8:80200c04 r7:ead3dd7c r6:ffffffff r5:86553d40 r4:00000000 [<81b06384>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xead3dd48 to 0xead3dd90) dd40: a4f6a000 edf57000 00000000 80238790 82cceee0 82ccfb24 dd60: 7f0db000 edf57000 00000000 00000001 82a0b880 ead3ddbc edf57000 ead3dd98 dd80: 8022f6e0 802387a8 80000013 ffffffff r5:80000013 r4:802387a8 [<8022f680>] (flush_tlb_kernel_range) from [<80506f20>] (__purge_vmap_area_lazy+0x294/0x484 mm/vmalloc.c:2376) [<80506c8c>] (__purge_vmap_area_lazy) from [<805072f8>] (_vm_unmap_aliases+0x1e8/0x238 mm/vmalloc.c:2990) r10:00000000 r9:ead3dde0 r8:00000000 r7:ffffffff r6:00000008 r5:ead3de28 r4:ead3dde0 [<80507110>] (_vm_unmap_aliases) from [<8050af60>] (vm_reset_perms mm/vmalloc.c:3382 [inline]) [<80507110>] (_vm_unmap_aliases) from [<8050af60>] (vfree+0x168/0x1d8 mm/vmalloc.c:3461) r10:8302ae05 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:861f4b00 r4:00000000 [<8050adf8>] (vfree) from [<8057a740>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:86553d40 r8:01800000 r7:00000000 r6:8302ae00 r5:00001000 r4:7f06f000 [<8057a710>] (execmem_free) from [<803d0c3c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1070) r5:00001000 r4:ea41f000 [<803d0c2c>] (bpf_jit_free_exec) from [<803d101c>] (bpf_jit_binary_free kernel/bpf/core.c:1116 [inline]) [<803d0c2c>] (bpf_jit_free_exec) from [<803d101c>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1239) [<803d0fb8>] (bpf_jit_free) from [<803d20c4>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:3029) r5:86129b8c r4:86129b8c [<803d1f7c>] (bpf_prog_free_deferred) from [<80276360>] (process_one_work+0x1c8/0x5a0 kernel/workqueue.c:3302) r7:ddde4e00 r6:8302ae00 r5:86129b8c r4:85930800 [<80276198>] (process_one_work) from [<80277124>] (process_scheduled_works kernel/workqueue.c:3385 [inline]) [<80276198>] (process_one_work) from [<80277124>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3466) r10:ddde4e00 r9:85930830 r8:86553d40 r7:82a03d80 r6:ddde4e20 r5:ddde4e00 r4:85930800 [<80276fb8>] (worker_thread) from [<8028117c>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:ead31e88 r8:85930780 r7:85930800 r6:80276fb8 r5:86553d40 r4:85cc5d00 [<80281060>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead3dfb0 to 0xead3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281060 r4:85cc5d00 INFO: task kworker/1:278:8539 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:278 state:D stack:0 pid:8539 tgid:8539 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81b04afc>] (__schedule) from [<81b05f8c>] (__schedule_loop kernel/sched/core.c:7267 [inline]) [<81b04afc>] (__schedule) from [<81b05f8c>] (schedule+0x2c/0x134 kernel/sched/core.c:7282) r10:ead29da4 r9:ead29dac r8:00000002 r7:60000013 r6:82ccfb50 r5:84710c40 r4:84710c40 [<81b05f60>] (schedule) from [<81b06118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7339) r5:84710c40 r4:82ccfb4c [<81b06100>] (schedule_preempt_disabled) from [<81b091f4>] (__mutex_lock_common kernel/locking/mutex.c:712 [inline]) [<81b06100>] (schedule_preempt_disabled) from [<81b091f4>] (__mutex_lock.constprop.0+0x530/0xa88 kernel/locking/mutex.c:806) [<81b08cc4>] (__mutex_lock.constprop.0) from [<81b09820>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1100) r10:82a0b82c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead29e28 r4:00000000 [<81b0980c>] (__mutex_lock_slowpath) from [<81b09860>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:305) [<81b09824>] (mutex_lock) from [<8050716c>] (_vm_unmap_aliases+0x5c/0x238 mm/vmalloc.c:2951) [<80507110>] (_vm_unmap_aliases) from [<8050af60>] (vm_reset_perms mm/vmalloc.c:3382 [inline]) [<80507110>] (_vm_unmap_aliases) from [<8050af60>] (vfree+0x168/0x1d8 mm/vmalloc.c:3461) r10:8302ae05 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:861f4a40 r4:00000000 [<8050adf8>] (vfree) from [<8057a740>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:84710c40 r8:01800000 r7:00000000 r6:8302ae00 r5:00001000 r4:7f071000 [<8057a710>] (execmem_free) from [<803d0c3c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1070) r5:00001000 r4:ea609000 [<803d0c2c>] (bpf_jit_free_exec) from [<803d101c>] (bpf_jit_binary_free kernel/bpf/core.c:1116 [inline]) [<803d0c2c>] (bpf_jit_free_exec) from [<803d101c>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1239) [<803d0fb8>] (bpf_jit_free) from [<803d20c4>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:3029) r5:85825b8c r4:85825b8c [<803d1f7c>] (bpf_prog_free_deferred) from [<80276360>] (process_one_work+0x1c8/0x5a0 kernel/workqueue.c:3302) r7:ddde4e00 r6:8302ae00 r5:85825b8c r4:861f0400 [<80276198>] (process_one_work) from [<80277124>] (process_scheduled_works kernel/workqueue.c:3385 [inline]) [<80276198>] (process_one_work) from [<80277124>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3466) r10:ddde4e00 r9:861f0430 r8:84710c40 r7:82a03d80 r6:ddde4e20 r5:ddde4e00 r4:861f0400 [<80276fb8>] (worker_thread) from [<8028117c>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:ead3de88 r8:85930900 r7:861f0400 r6:80276fb8 r5:84710c40 r4:860a4480 [<80281060>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead29fb0 to 0xead29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281060 r4:860a4480 INFO: task kworker/1:278:8539 is blocked on a mutex likely owned by task kworker/1:276:8529. task:kworker/1:276 state:R running task stack:0 pid:8529 tgid:8529 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81b04afc>] (__schedule) from [<81b063c4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7512) r10:82a0b880 r9:86553d40 r8:80200c04 r7:ead3dd7c r6:ffffffff r5:86553d40 r4:00000000 [<81b06384>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xead3dd48 to 0xead3dd90) dd40: a5426000 edf57000 00000000 80238790 82cceee0 82ccfb24 dd60: 7f0db000 edf57000 00000000 00000001 82a0b880 ead3ddbc edf57000 ead3dd98 dd80: 8022f6e0 802387a8 80000013 ffffffff r5:80000013 r4:802387a8 [<8022f680>] (flush_tlb_kernel_range) from [<80506f20>] (__purge_vmap_area_lazy+0x294/0x484 mm/vmalloc.c:2376) [<80506c8c>] (__purge_vmap_area_lazy) from [<805072f8>] (_vm_unmap_aliases+0x1e8/0x238 mm/vmalloc.c:2990) r10:00000000 r9:ead3dde0 r8:00000000 r7:ffffffff r6:00000008 r5:ead3de28 r4:ead3dde0 [<80507110>] (_vm_unmap_aliases) from [<8050af60>] (vm_reset_perms mm/vmalloc.c:3382 [inline]) [<80507110>] (_vm_unmap_aliases) from [<8050af60>] (vfree+0x168/0x1d8 mm/vmalloc.c:3461) r10:8302ae05 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:861f4b00 r4:00000000 [<8050adf8>] (vfree) from [<8057a740>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:86553d40 r8:01800000 r7:00000000 r6:8302ae00 r5:00001000 r4:7f06f000 [<8057a710>] (execmem_free) from [<803d0c3c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1070) r5:00001000 r4:ea41f000 [<803d0c2c>] (bpf_jit_free_exec) from [<803d101c>] (bpf_jit_binary_free kernel/bpf/core.c:1116 [inline]) [<803d0c2c>] (bpf_jit_free_exec) from [<803d101c>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1239) [<803d0fb8>] (bpf_jit_free) from [<803d20c4>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:3029) r5:86129b8c r4:86129b8c [<803d1f7c>] (bpf_prog_free_deferred) from [<80276360>] (process_one_work+0x1c8/0x5a0 kernel/workqueue.c:3302) r7:ddde4e00 r6:8302ae00 r5:86129b8c r4:85930800 [<80276198>] (process_one_work) from [<80277124>] (process_scheduled_works kernel/workqueue.c:3385 [inline]) [<80276198>] (process_one_work) from [<80277124>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3466) r10:ddde4e00 r9:85930830 r8:86553d40 r7:82a03d80 r6:ddde4e20 r5:ddde4e00 r4:85930800 [<80276fb8>] (worker_thread) from [<8028117c>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:ead31e88 r8:85930780 r7:85930800 r6:80276fb8 r5:86553d40 r4:85cc5d00 [<80281060>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead3dfb0 to 0xead3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281060 r4:85cc5d00 INFO: task kworker/1:280:8545 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:280 state:D stack:0 pid:8545 tgid:8545 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81b04afc>] (__schedule) from [<81b05f8c>] (__schedule_loop kernel/sched/core.c:7267 [inline]) [<81b04afc>] (__schedule) from [<81b05f8c>] (schedule+0x2c/0x134 kernel/sched/core.c:7282) r10:ead5dda4 r9:ead5ddac r8:00000002 r7:60000113 r6:82ccfb50 r5:8646e200 r4:8646e200 [<81b05f60>] (schedule) from [<81b06118>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7339) r5:8646e200 r4:82ccfb4c [<81b06100>] (schedule_preempt_disabled) from [<81b091f4>] (__mutex_lock_common kernel/locking/mutex.c:712 [inline]) [<81b06100>] (schedule_preempt_disabled) from [<81b091f4>] (__mutex_lock.constprop.0+0x530/0xa88 kernel/locking/mutex.c:806) [<81b08cc4>] (__mutex_lock.constprop.0) from [<81b09820>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1100) r10:82a0b82c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead5de28 r4:00000000 [<81b0980c>] (__mutex_lock_slowpath) from [<81b09860>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:305) [<81b09824>] (mutex_lock) from [<8050716c>] (_vm_unmap_aliases+0x5c/0x238 mm/vmalloc.c:2951) [<80507110>] (_vm_unmap_aliases) from [<8050af60>] (vm_reset_perms mm/vmalloc.c:3382 [inline]) [<80507110>] (_vm_unmap_aliases) from [<8050af60>] (vfree+0x168/0x1d8 mm/vmalloc.c:3461) r10:8302ae05 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e87e40 r4:00000000 [<8050adf8>] (vfree) from [<8057a740>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:8646e200 r8:01800000 r7:00000000 r6:8302ae00 r5:00001000 r4:7f055000 [<8057a710>] (execmem_free) from [<803d0c3c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1070) r5:00001000 r4:dfa59000 [<803d0c2c>] (bpf_jit_free_exec) from [<803d101c>] (bpf_jit_binary_free kernel/bpf/core.c:1116 [inline]) [<803d0c2c>] (bpf_jit_free_exec) from [<803d101c>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1239) [<803d0fb8>] (bpf_jit_free) from [<803d20c4>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:3029) r5:864ecb8c r4:864ecb8c [<803d1f7c>] (bpf_prog_free_deferred) from [<80276360>] (process_one_work+0x1c8/0x5a0 kernel/workqueue.c:3302) r7:ddde4e00 r6:8302ae00 r5:864ecb8c r4:85930380 [<80276198>] (process_one_work) from [<80277124>] (process_scheduled_works kernel/workqueue.c:3385 [inline]) [<80276198>] (process_one_work) from [<80277124>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3466) r10:00000000 r9:859303b0 r8:8646e200 r7:82a03d80 r6:ddde4e20 r5:ddde4e00 r4:85930380 [<80276fb8>] (worker_thread) from [<8028117c>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:ead59e88 r8:85930300 r7:85930380 r6:80276fb8 r5:8646e200 r4:863d0480 [<80281060>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead5dfb0 to 0xead5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281060 r4:863d0480 INFO: task kworker/1:280:8545 is blocked on a mutex likely owned by task kworker/1:276:8529. task:kworker/1:276 state:R running task stack:0 pid:8529 tgid:8529 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81b04afc>] (__schedule) from [<81b063c4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7512) r10:82a0b880 r9:86553d40 r8:80200c04 r7:ead3dd7c r6:ffffffff r5:86553d40 r4:00000000 [<81b06384>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xead3dd48 to 0xead3dd90) dd40: a5e65000 edf57000 00000000 80238790 82cceee0 82ccfb24 dd60: 7f0db000 edf57000 00000000 00000001 82a0b880 ead3ddbc edf57000 ead3dd98 dd80: 8022f6e0 802387a8 80000013 ffffffff r5:80000013 r4:802387a8 [<8022f680>] (flush_tlb_kernel_range) from [<80506f20>] (__purge_vmap_area_lazy+0x294/0x484 mm/vmalloc.c:2376) [<80506c8c>] (__purge_vmap_area_lazy) from [<805072f8>] (_vm_unmap_aliases+0x1e8/0x238 mm/vmalloc.c:2990) r10:00000000 r9:ead3dde0 r8:00000000 r7:ffffffff r6:00000008 r5:ead3de28 r4:ead3dde0 [<80507110>] (_vm_unmap_aliases) from [<8050af60>] (vm_reset_perms mm/vmalloc.c:3382 [inline]) [<80507110>] (_vm_unmap_aliases) from [<8050af60>] (vfree+0x168/0x1d8 mm/vmalloc.c:3461) r10:8302ae05 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:861f4b00 r4:00000000 [<8050adf8>] (vfree) from [<8057a740>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:86553d40 r8:01800000 r7:00000000 r6:8302ae00 r5:00001000 r4:7f06f000 [<8057a710>] (execmem_free) from [<803d0c3c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1070) r5:00001000 r4:ea41f000 [<803d0c2c>] (bpf_jit_free_exec) from [<803d101c>] (bpf_jit_binary_free kernel/bpf/core.c:1116 [inline]) [<803d0c2c>] (bpf_jit_free_exec) from [<803d101c>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1239) [<803d0fb8>] (bpf_jit_free) from [<803d20c4>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:3029) r5:86129b8c r4:86129b8c [<803d1f7c>] (bpf_prog_free_deferred) from [<80276360>] (process_one_work+0x1c8/0x5a0 kernel/workqueue.c:3302) r7:ddde4e00 r6:8302ae00 r5:86129b8c r4:85930800 [<80276198>] (process_one_work) from [<80277124>] (process_scheduled_works kernel/workqueue.c:3385 [inline]) [<80276198>] (process_one_work) from [<80277124>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3466) r10:ddde4e00 r9:85930830 r8:86553d40 r7:82a03d80 r6:ddde4e20 r5:ddde4e00 r4:85930800 [<80276fb8>] (worker_thread) from [<8028117c>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:ead31e88 r8:85930780 r7:85930800 r6:80276fb8 r5:86553d40 r4:85cc5d00 [<80281060>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead3dfb0 to 0xead3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281060 r4:85cc5d00 NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 29 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT Hardware name: ARM-Versatile Express Call trace: [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c arch/arm/kernel/traps.c:257) r7:60000193 r6:60000193 r5:8231b914 r4:00000000 [<80201af0>] (show_stack) from [<8021e320>] (__dump_stack lib/dump_stack.c:94 [inline]) [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70 lib/dump_stack.c:120) [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c lib/dump_stack.c:129) r7:00000000 r6:00000113 r5:00000001 r4:00000001 [<8021e334>] (dump_stack) from [<81aee3d4>] (nmi_cpu_backtrace+0x150/0x170 lib/nmi_backtrace.c:113) [<81aee284>] (nmi_cpu_backtrace) from [<81aee524>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8 lib/nmi_backtrace.c:62) r7:00000001 r6:82a0b550 r5:82a19f34 r4:ffffffff [<81aee3f4>] (nmi_trigger_cpumask_backtrace) from [<8022f104>] (arch_trigger_cpumask_backtrace+0x18/0x1c arch/arm/kernel/smp.c:852) r9:82a0b6d8 r8:00000006 r7:00000048 r6:82cc2de4 r5:00007752 r4:00000048 [<8022f0ec>] (arch_trigger_cpumask_backtrace) from [<81af6070>] (trigger_all_cpu_backtrace include/linux/nmi.h:162 [inline]) [<8022f0ec>] (arch_trigger_cpumask_backtrace) from [<81af6070>] (__sys_info lib/sys_info.c:157 [inline]) [<8022f0ec>] (arch_trigger_cpumask_backtrace) from [<81af6070>] (sys_info+0x68/0xa8 lib/sys_info.c:165) [<81af6008>] (sys_info) from [<80385d58>] (check_hung_uninterruptible_tasks kernel/hung_task.c:353 [inline]) [<81af6008>] (sys_info) from [<80385d58>] (watchdog+0x3a0/0x84c kernel/hung_task.c:561) r5:00007752 r4:0000000a [<803859b8>] (watchdog) from [<8028117c>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:df819e58 r8:83358e80 r7:00000000 r6:803859b8 r5:83810c40 r4:83324780 [<80281060>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf8d5fb0 to 0xdf8d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281060 r4:83324780 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 2819 Comm: pr/ttyAMA-1 Not tainted syzkaller #0 PREEMPT Hardware name: ARM-Versatile Express PC is at __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:179 [inline] PC is at _raw_spin_unlock_irqrestore+0x28/0x54 kernel/locking/spinlock.c:198 LR is at spin_unlock_irqrestore include/linux/spinlock.h:408 [inline] LR is at __uart_port_unlock_irqrestore include/linux/serial_core.h:616 [inline] LR is at pl011_console_device_unlock+0x20/0x24 drivers/tty/serial/amba-pl011.c:2668 pc : [<81b0f394>] lr : [<80add268>] psr: 60000013 sp : eb405ec8 ip : eb405ed8 fp : eb405ed4 r10: 82b591a4 r9 : 00000000 r8 : 00000000 r7 : 00000117 r6 : 82b59108 r5 : 00000000 r4 : 00000001 r3 : 00000852 r2 : 00000000 r1 : 60000013 r0 : 846d1040 Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user Control: 30c5387d Table: 86cf14c0 DAC: fffffffd Call trace: [<81b0f36c>] (_raw_spin_unlock_irqrestore) from [<80add268>] (spin_unlock_irqrestore include/linux/spinlock.h:408 [inline]) [<81b0f36c>] (_raw_spin_unlock_irqrestore) from [<80add268>] (__uart_port_unlock_irqrestore include/linux/serial_core.h:616 [inline]) [<81b0f36c>] (_raw_spin_unlock_irqrestore) from [<80add268>] (pl011_console_device_unlock+0x20/0x24 drivers/tty/serial/amba-pl011.c:2668) [<80add248>] (pl011_console_device_unlock) from [<802e68a8>] (nbcon_emit_one+0x88/0x100 kernel/printk/nbcon.c:1165) [<802e6820>] (nbcon_emit_one) from [<802e6b28>] (nbcon_kthread_func+0x208/0x2ec kernel/printk/nbcon.c:1271) r6:82cbf2d4 r5:82b59108 r4:850cee40 [<802e6920>] (nbcon_kthread_func) from [<8028117c>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:ea429b38 r8:8484c400 r7:82b59108 r6:802e6920 r5:850cee40 r4:83934d40 [<80281060>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb405fb0 to 0xeb405ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281060 r4:83934d40