INFO: task kworker/1:2:7885 blocked for more than 430 seconds. Tainted: G L syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:2 state:D stack:0 pid:7885 tgid:7885 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81aea50c>] (__schedule) from [<81aeb920>] (__schedule_loop kernel/sched/core.c:6993 [inline]) [<81aea50c>] (__schedule) from [<81aeb920>] (schedule+0x2c/0x134 kernel/sched/core.c:7008) r10:dfb09da4 r9:00000002 r8:600f0013 r7:dfb09dac r6:82918014 r5:83ac6e40 r4:83ac6e40 [<81aeb8f4>] (schedule) from [<81aebaac>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7065) r5:83ac6e40 r4:82918010 [<81aeba94>] (schedule_preempt_disabled) from [<81aee9f4>] (__mutex_lock_common kernel/locking/mutex.c:692 [inline]) [<81aeba94>] (schedule_preempt_disabled) from [<81aee9f4>] (__mutex_lock.constprop.0+0x480/0x9cc kernel/locking/mutex.c:776) [<81aee574>] (__mutex_lock.constprop.0) from [<81aef014>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1065) r10:8280c82c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb09e28 r4:00000000 [<81aef000>] (__mutex_lock_slowpath) from [<81aef054>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:290) [<81aef018>] (mutex_lock) from [<804fd8ec>] (_vm_unmap_aliases+0x5c/0x238 mm/vmalloc.c:2957) [<804fd890>] (_vm_unmap_aliases) from [<805016e4>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fd890>] (_vm_unmap_aliases) from [<805016e4>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302ae05 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:861d2440 r4:00000000 [<80501578>] (vfree) from [<8056f870>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83ac6e40 r8:01800000 r7:00000000 r6:8302ae00 r5:00001000 r4:7f290000 [<8056f840>] (execmem_free) from [<803cf288>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:dfaf1000 [<803cf278>] (bpf_jit_free_exec) from [<803cf668>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803cf278>] (bpf_jit_free_exec) from [<803cf668>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf604>] (bpf_jit_free) from [<803d067c>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2968) r5:86cd5394 r4:86cd5394 [<803d0534>] (bpf_prog_free_deferred) from [<802766b8>] (process_one_work+0x1c8/0x59c kernel/workqueue.c:3276) r7:ddde4d80 r6:8302ae00 r5:86cd5394 r4:87658d80 [<802764f0>] (process_one_work) from [<80277478>] (process_scheduled_works kernel/workqueue.c:3359 [inline]) [<802764f0>] (process_one_work) from [<80277478>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3440) r10:ddde4d80 r9:87658db0 r8:83ac6e40 r7:82804d80 r6:ddde4da0 r5:ddde4d80 r4:87658d80 [<8027730c>] (worker_thread) from [<802814a4>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:ebe8de88 r8:86c7cc80 r7:87658d80 r6:8027730c r5:83ac6e40 r4:86f99f00 [<80281388>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb09fb0 to 0xdfb09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281388 r4:86f99f00 INFO: task kworker/1:2:7885 is blocked on a mutex likely owned by task kworker/1:10:26259. task:kworker/1:10 state:R running task stack:0 pid:26259 tgid:26259 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81aea50c>] (__schedule) from [<81aebd58>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7238) r10:8280c880 r9:84eca4c0 r8:80200c04 r7:dfa21d7c r6:ffffffff r5:84eca4c0 r4:00000000 [<81aebd18>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfa21d48 to 0xdfa21d90) 1d40: c364e000 eac19000 00000000 802387d0 82ad3620 82ad4264 1d60: 7f26e000 eac19000 00000000 00000001 8280c880 dfa21dbc eac19000 dfa21d98 1d80: 8022f700 802387e8 80000013 ffffffff r5:80000013 r4:802387e8 [<8022f6a0>] (flush_tlb_kernel_range) from [<804fd69c>] (__purge_vmap_area_lazy+0x298/0x48c mm/vmalloc.c:2382) [<804fd404>] (__purge_vmap_area_lazy) from [<804fda78>] (_vm_unmap_aliases+0x1e8/0x238 mm/vmalloc.c:2996) r10:00000000 r9:dfa21de0 r8:00000000 r7:ffffffff r6:00000008 r5:dfa21e28 r4:dfa21de0 [<804fd890>] (_vm_unmap_aliases) from [<805016e4>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fd890>] (_vm_unmap_aliases) from [<805016e4>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302ae05 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8689aa40 r4:00000000 [<80501578>] (vfree) from [<8056f870>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:84eca4c0 r8:01800000 r7:00000000 r6:8302ae00 r5:00001000 r4:7f2a0000 [<8056f840>] (execmem_free) from [<803cf288>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:e01a9000 [<803cf278>] (bpf_jit_free_exec) from [<803cf668>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803cf278>] (bpf_jit_free_exec) from [<803cf668>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf604>] (bpf_jit_free) from [<803d067c>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2968) r5:85935394 r4:85935394 [<803d0534>] (bpf_prog_free_deferred) from [<802766b8>] (process_one_work+0x1c8/0x59c kernel/workqueue.c:3276) r7:ddde4d80 r6:8302ae00 r5:85935394 r4:87be3500 [<802764f0>] (process_one_work) from [<80277478>] (process_scheduled_works kernel/workqueue.c:3359 [inline]) [<802764f0>] (process_one_work) from [<80277478>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3440) r10:00000000 r9:87be3530 r8:84eca4c0 r7:82804d80 r6:ddde4da0 r5:ddde4d80 r4:87be3500 [<8027730c>] (worker_thread) from [<802814a4>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:dfc01e88 r8:85af8100 r7:87be3500 r6:8027730c r5:84eca4c0 r4:86852140 [<80281388>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa21fb0 to 0xdfa21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281388 r4:86852140 INFO: task kworker/1:0:21898 blocked for more than 430 seconds. Tainted: G L syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:0 state:D stack:0 pid:21898 tgid:21898 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81aea50c>] (__schedule) from [<81aeb920>] (__schedule_loop kernel/sched/core.c:6993 [inline]) [<81aea50c>] (__schedule) from [<81aeb920>] (schedule+0x2c/0x134 kernel/sched/core.c:7008) r10:eb30dda4 r9:00000002 r8:60000013 r7:eb30ddac r6:82918014 r5:83bed5c0 r4:83bed5c0 [<81aeb8f4>] (schedule) from [<81aebaac>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7065) r5:83bed5c0 r4:82918010 [<81aeba94>] (schedule_preempt_disabled) from [<81aee9f4>] (__mutex_lock_common kernel/locking/mutex.c:692 [inline]) [<81aeba94>] (schedule_preempt_disabled) from [<81aee9f4>] (__mutex_lock.constprop.0+0x480/0x9cc kernel/locking/mutex.c:776) [<81aee574>] (__mutex_lock.constprop.0) from [<81aef014>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1065) r10:8280c82c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb30de28 r4:00000000 [<81aef000>] (__mutex_lock_slowpath) from [<81aef054>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:290) [<81aef018>] (mutex_lock) from [<804fd8ec>] (_vm_unmap_aliases+0x5c/0x238 mm/vmalloc.c:2957) [<804fd890>] (_vm_unmap_aliases) from [<805016e4>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fd890>] (_vm_unmap_aliases) from [<805016e4>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302ae05 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86fbc300 r4:00000000 [<80501578>] (vfree) from [<8056f870>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83bed5c0 r8:01800000 r7:00000000 r6:8302ae00 r5:00001000 r4:7f29c000 [<8056f840>] (execmem_free) from [<803cf288>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:dfcf5000 [<803cf278>] (bpf_jit_free_exec) from [<803cf668>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803cf278>] (bpf_jit_free_exec) from [<803cf668>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf604>] (bpf_jit_free) from [<803d067c>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2968) r5:86cf1394 r4:86cf1394 [<803d0534>] (bpf_prog_free_deferred) from [<802766b8>] (process_one_work+0x1c8/0x59c kernel/workqueue.c:3276) r7:ddde4d80 r6:8302ae00 r5:86cf1394 r4:85ae3880 [<802764f0>] (process_one_work) from [<80277478>] (process_scheduled_works kernel/workqueue.c:3359 [inline]) [<802764f0>] (process_one_work) from [<80277478>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3440) r10:ddde4d80 r9:85ae38b0 r8:83bed5c0 r7:82804d80 r6:ddde4da0 r5:ddde4d80 r4:85ae3880 [<8027730c>] (worker_thread) from [<802814a4>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:dfaf5e88 r8:85d11680 r7:85ae3880 r6:8027730c r5:83bed5c0 r4:86102d40 [<80281388>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb30dfb0 to 0xeb30dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281388 r4:86102d40 INFO: task kworker/1:0:21898 is blocked on a mutex likely owned by task kworker/1:10:26259. task:kworker/1:10 state:R running task stack:0 pid:26259 tgid:26259 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81aea50c>] (__schedule) from [<81aebd58>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7238) r10:8280c880 r9:84eca4c0 r8:80200c04 r7:dfa21d7c r6:ffffffff r5:84eca4c0 r4:00000000 [<81aebd18>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfa21d48 to 0xdfa21d90) 1d40: c364e000 eac19000 00000000 802387d0 82ad3620 82ad4264 1d60: 7f26e000 eac19000 00000000 00000001 8280c880 dfa21dbc eac19000 dfa21d98 1d80: 8022f700 802387e8 80000013 ffffffff r5:80000013 r4:802387e8 [<8022f6a0>] (flush_tlb_kernel_range) from [<804fd69c>] (__purge_vmap_area_lazy+0x298/0x48c mm/vmalloc.c:2382) [<804fd404>] (__purge_vmap_area_lazy) from [<804fda78>] (_vm_unmap_aliases+0x1e8/0x238 mm/vmalloc.c:2996) r10:00000000 r9:dfa21de0 r8:00000000 r7:ffffffff r6:00000008 r5:dfa21e28 r4:dfa21de0 [<804fd890>] (_vm_unmap_aliases) from [<805016e4>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fd890>] (_vm_unmap_aliases) from [<805016e4>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302ae05 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8689aa40 r4:00000000 [<80501578>] (vfree) from [<8056f870>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:84eca4c0 r8:01800000 r7:00000000 r6:8302ae00 r5:00001000 r4:7f2a0000 [<8056f840>] (execmem_free) from [<803cf288>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:e01a9000 [<803cf278>] (bpf_jit_free_exec) from [<803cf668>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803cf278>] (bpf_jit_free_exec) from [<803cf668>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf604>] (bpf_jit_free) from [<803d067c>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2968) r5:85935394 r4:85935394 [<803d0534>] (bpf_prog_free_deferred) from [<802766b8>] (process_one_work+0x1c8/0x59c kernel/workqueue.c:3276) r7:ddde4d80 r6:8302ae00 r5:85935394 r4:87be3500 [<802764f0>] (process_one_work) from [<80277478>] (process_scheduled_works kernel/workqueue.c:3359 [inline]) [<802764f0>] (process_one_work) from [<80277478>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3440) r10:00000000 r9:87be3530 r8:84eca4c0 r7:82804d80 r6:ddde4da0 r5:ddde4d80 r4:87be3500 [<8027730c>] (worker_thread) from [<802814a4>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:dfc01e88 r8:85af8100 r7:87be3500 r6:8027730c r5:84eca4c0 r4:86852140 [<80281388>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa21fb0 to 0xdfa21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281388 r4:86852140 INFO: task kworker/1:1:23776 blocked for more than 430 seconds. Tainted: G L syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1 state:D stack:0 pid:23776 tgid:23776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81aea50c>] (__schedule) from [<81aeb920>] (__schedule_loop kernel/sched/core.c:6993 [inline]) [<81aea50c>] (__schedule) from [<81aeb920>] (schedule+0x2c/0x134 kernel/sched/core.c:7008) r10:ea5f1da4 r9:00000002 r8:60000113 r7:ea5f1dac r6:82918014 r5:8479b100 r4:8479b100 [<81aeb8f4>] (schedule) from [<81aebaac>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7065) r5:8479b100 r4:82918010 [<81aeba94>] (schedule_preempt_disabled) from [<81aee9f4>] (__mutex_lock_common kernel/locking/mutex.c:692 [inline]) [<81aeba94>] (schedule_preempt_disabled) from [<81aee9f4>] (__mutex_lock.constprop.0+0x480/0x9cc kernel/locking/mutex.c:776) [<81aee574>] (__mutex_lock.constprop.0) from [<81aef014>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1065) r10:8280c82c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea5f1e28 r4:00000000 [<81aef000>] (__mutex_lock_slowpath) from [<81aef054>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:290) [<81aef018>] (mutex_lock) from [<804fd8ec>] (_vm_unmap_aliases+0x5c/0x238 mm/vmalloc.c:2957) [<804fd890>] (_vm_unmap_aliases) from [<805016e4>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fd890>] (_vm_unmap_aliases) from [<805016e4>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302ae05 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86fbc0c0 r4:00000000 [<80501578>] (vfree) from [<8056f870>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:8479b100 r8:01800000 r7:00000000 r6:8302ae00 r5:00001000 r4:7f29e000 [<8056f840>] (execmem_free) from [<803cf288>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:dfd37000 [<803cf278>] (bpf_jit_free_exec) from [<803cf668>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803cf278>] (bpf_jit_free_exec) from [<803cf668>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf604>] (bpf_jit_free) from [<803d067c>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2968) r5:85936394 r4:85936394 [<803d0534>] (bpf_prog_free_deferred) from [<802766b8>] (process_one_work+0x1c8/0x59c kernel/workqueue.c:3276) r7:ddde4d80 r6:8302ae00 r5:85936394 r4:864e2100 [<802764f0>] (process_one_work) from [<80277478>] (process_scheduled_works kernel/workqueue.c:3359 [inline]) [<802764f0>] (process_one_work) from [<80277478>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3440) r10:ddde4d80 r9:864e2130 r8:8479b100 r7:82804d80 r6:ddde4da0 r5:ddde4d80 r4:864e2100 [<8027730c>] (worker_thread) from [<802814a4>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:eb30de88 r8:87034d00 r7:864e2100 r6:8027730c r5:8479b100 r4:864dc980 [<80281388>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea5f1fb0 to 0xea5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281388 r4:864dc980 INFO: task kworker/1:1:23776 is blocked on a mutex likely owned by task kworker/1:10:26259. task:kworker/1:10 state:R running task stack:0 pid:26259 tgid:26259 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81aea50c>] (__schedule) from [<81aebd58>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7238) r10:8280c880 r9:84eca4c0 r8:80200c04 r7:dfa21d7c r6:ffffffff r5:84eca4c0 r4:00000000 [<81aebd18>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfa21d48 to 0xdfa21d90) 1d40: c364e000 eac19000 00000000 802387d0 82ad3620 82ad4264 1d60: 7f26e000 eac19000 00000000 00000001 8280c880 dfa21dbc eac19000 dfa21d98 1d80: 8022f700 802387e8 80000013 ffffffff r5:80000013 r4:802387e8 [<8022f6a0>] (flush_tlb_kernel_range) from [<804fd69c>] (__purge_vmap_area_lazy+0x298/0x48c mm/vmalloc.c:2382) [<804fd404>] (__purge_vmap_area_lazy) from [<804fda78>] (_vm_unmap_aliases+0x1e8/0x238 mm/vmalloc.c:2996) r10:00000000 r9:dfa21de0 r8:00000000 r7:ffffffff r6:00000008 r5:dfa21e28 r4:dfa21de0 [<804fd890>] (_vm_unmap_aliases) from [<805016e4>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fd890>] (_vm_unmap_aliases) from [<805016e4>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302ae05 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8689aa40 r4:00000000 [<80501578>] (vfree) from [<8056f870>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:84eca4c0 r8:01800000 r7:00000000 r6:8302ae00 r5:00001000 r4:7f2a0000 [<8056f840>] (execmem_free) from [<803cf288>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:e01a9000 [<803cf278>] (bpf_jit_free_exec) from [<803cf668>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803cf278>] (bpf_jit_free_exec) from [<803cf668>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf604>] (bpf_jit_free) from [<803d067c>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2968) r5:85935394 r4:85935394 [<803d0534>] (bpf_prog_free_deferred) from [<802766b8>] (process_one_work+0x1c8/0x59c kernel/workqueue.c:3276) r7:ddde4d80 r6:8302ae00 r5:85935394 r4:87be3500 [<802764f0>] (process_one_work) from [<80277478>] (process_scheduled_works kernel/workqueue.c:3359 [inline]) [<802764f0>] (process_one_work) from [<80277478>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3440) r10:00000000 r9:87be3530 r8:84eca4c0 r7:82804d80 r6:ddde4da0 r5:ddde4d80 r4:87be3500 [<8027730c>] (worker_thread) from [<802814a4>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:dfc01e88 r8:85af8100 r7:87be3500 r6:8027730c r5:84eca4c0 r4:86852140 [<80281388>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa21fb0 to 0xdfa21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281388 r4:86852140 INFO: task kworker/1:5:23917 blocked for more than 430 seconds. Tainted: G L syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:5 state:D stack:0 pid:23917 tgid:23917 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81aea50c>] (__schedule) from [<81aeb920>] (__schedule_loop kernel/sched/core.c:6993 [inline]) [<81aea50c>] (__schedule) from [<81aeb920>] (schedule+0x2c/0x134 kernel/sched/core.c:7008) r10:ea875da4 r9:00000002 r8:60000013 r7:ea875dac r6:82918014 r5:84f00000 r4:84f00000 [<81aeb8f4>] (schedule) from [<81aebaac>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7065) r5:84f00000 r4:82918010 [<81aeba94>] (schedule_preempt_disabled) from [<81aee9f4>] (__mutex_lock_common kernel/locking/mutex.c:692 [inline]) [<81aeba94>] (schedule_preempt_disabled) from [<81aee9f4>] (__mutex_lock.constprop.0+0x480/0x9cc kernel/locking/mutex.c:776) [<81aee574>] (__mutex_lock.constprop.0) from [<81aef014>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1065) r10:8280c82c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea875e28 r4:00000000 [<81aef000>] (__mutex_lock_slowpath) from [<81aef054>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:290) [<81aef018>] (mutex_lock) from [<804fd8ec>] (_vm_unmap_aliases+0x5c/0x238 mm/vmalloc.c:2957) [<804fd890>] (_vm_unmap_aliases) from [<805016e4>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fd890>] (_vm_unmap_aliases) from [<805016e4>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302ae05 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86b04800 r4:00000000 [<80501578>] (vfree) from [<8056f870>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:84f00000 r8:01800000 r7:00000000 r6:8302ae00 r5:00001000 r4:7f280000 [<8056f840>] (execmem_free) from [<803cf288>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:dfae1000 [<803cf278>] (bpf_jit_free_exec) from [<803cf668>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803cf278>] (bpf_jit_free_exec) from [<803cf668>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf604>] (bpf_jit_free) from [<803d067c>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2968) r5:86cd4394 r4:86cd4394 [<803d0534>] (bpf_prog_free_deferred) from [<802766b8>] (process_one_work+0x1c8/0x59c kernel/workqueue.c:3276) r7:ddde4d80 r6:8302ae00 r5:86cd4394 r4:845acb80 [<802764f0>] (process_one_work) from [<80277478>] (process_scheduled_works kernel/workqueue.c:3359 [inline]) [<802764f0>] (process_one_work) from [<80277478>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3440) r10:00000000 r9:845acbb0 r8:84f00000 r7:82804d80 r6:ddde4da0 r5:ddde4d80 r4:845acb80 [<8027730c>] (worker_thread) from [<802814a4>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:e4449e88 r8:83341700 r7:845acb80 r6:8027730c r5:84f00000 r4:861484c0 [<80281388>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea875fb0 to 0xea875ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281388 r4:861484c0 INFO: task kworker/1:5:23917 is blocked on a mutex likely owned by task kworker/1:10:26259. task:kworker/1:10 state:R running task stack:0 pid:26259 tgid:26259 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81aea50c>] (__schedule) from [<81aebd58>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7238) r10:8280c880 r9:84eca4c0 r8:80200c04 r7:dfa21d7c r6:ffffffff r5:84eca4c0 r4:00000000 [<81aebd18>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfa21d48 to 0xdfa21d90) 1d40: c364e000 eac19000 00000000 802387d0 82ad3620 82ad4264 1d60: 7f26e000 eac19000 00000000 00000001 8280c880 dfa21dbc eac19000 dfa21d98 1d80: 8022f700 802387e8 80000013 ffffffff r5:80000013 r4:802387e8 [<8022f6a0>] (flush_tlb_kernel_range) from [<804fd69c>] (__purge_vmap_area_lazy+0x298/0x48c mm/vmalloc.c:2382) [<804fd404>] (__purge_vmap_area_lazy) from [<804fda78>] (_vm_unmap_aliases+0x1e8/0x238 mm/vmalloc.c:2996) r10:00000000 r9:dfa21de0 r8:00000000 r7:ffffffff r6:00000008 r5:dfa21e28 r4:dfa21de0 [<804fd890>] (_vm_unmap_aliases) from [<805016e4>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fd890>] (_vm_unmap_aliases) from [<805016e4>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302ae05 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8689aa40 r4:00000000 [<80501578>] (vfree) from [<8056f870>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:84eca4c0 r8:01800000 r7:00000000 r6:8302ae00 r5:00001000 r4:7f2a0000 [<8056f840>] (execmem_free) from [<803cf288>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:e01a9000 [<803cf278>] (bpf_jit_free_exec) from [<803cf668>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803cf278>] (bpf_jit_free_exec) from [<803cf668>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf604>] (bpf_jit_free) from [<803d067c>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2968) r5:85935394 r4:85935394 [<803d0534>] (bpf_prog_free_deferred) from [<802766b8>] (process_one_work+0x1c8/0x59c kernel/workqueue.c:3276) r7:ddde4d80 r6:8302ae00 r5:85935394 r4:87be3500 [<802764f0>] (process_one_work) from [<80277478>] (process_scheduled_works kernel/workqueue.c:3359 [inline]) [<802764f0>] (process_one_work) from [<80277478>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3440) r10:00000000 r9:87be3530 r8:84eca4c0 r7:82804d80 r6:ddde4da0 r5:ddde4d80 r4:87be3500 [<8027730c>] (worker_thread) from [<802814a4>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:dfc01e88 r8:85af8100 r7:87be3500 r6:8027730c r5:84eca4c0 r4:86852140 [<80281388>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa21fb0 to 0xdfa21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281388 r4:86852140 INFO: task kworker/1:7:25918 blocked for more than 430 seconds. Tainted: G L syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:7 state:D stack:0 pid:25918 tgid:25918 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81aea50c>] (__schedule) from [<81aeb920>] (__schedule_loop kernel/sched/core.c:6993 [inline]) [<81aea50c>] (__schedule) from [<81aeb920>] (schedule+0x2c/0x134 kernel/sched/core.c:7008) r10:dfcfdda4 r9:00000002 r8:600f0013 r7:dfcfddac r6:82918014 r5:84f1e200 r4:84f1e200 [<81aeb8f4>] (schedule) from [<81aebaac>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7065) r5:84f1e200 r4:82918010 [<81aeba94>] (schedule_preempt_disabled) from [<81aee9f4>] (__mutex_lock_common kernel/locking/mutex.c:692 [inline]) [<81aeba94>] (schedule_preempt_disabled) from [<81aee9f4>] (__mutex_lock.constprop.0+0x480/0x9cc kernel/locking/mutex.c:776) [<81aee574>] (__mutex_lock.constprop.0) from [<81aef014>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1065) r10:8280c82c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcfde28 r4:00000000 [<81aef000>] (__mutex_lock_slowpath) from [<81aef054>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:290) [<81aef018>] (mutex_lock) from [<804fd8ec>] (_vm_unmap_aliases+0x5c/0x238 mm/vmalloc.c:2957) [<804fd890>] (_vm_unmap_aliases) from [<805016e4>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fd890>] (_vm_unmap_aliases) from [<805016e4>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302ae05 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86b04cc0 r4:00000000 [<80501578>] (vfree) from [<8056f870>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:84f1e200 r8:01800000 r7:00000000 r6:8302ae00 r5:00001000 r4:7f28e000 [<8056f840>] (execmem_free) from [<803cf288>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:dfaef000 [<803cf278>] (bpf_jit_free_exec) from [<803cf668>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803cf278>] (bpf_jit_free_exec) from [<803cf668>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf604>] (bpf_jit_free) from [<803d067c>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2968) r5:874dfb94 r4:874dfb94 [<803d0534>] (bpf_prog_free_deferred) from [<802766b8>] (process_one_work+0x1c8/0x59c kernel/workqueue.c:3276) r7:ddde4d80 r6:8302ae00 r5:874dfb94 r4:87020400 [<802764f0>] (process_one_work) from [<80277478>] (process_scheduled_works kernel/workqueue.c:3359 [inline]) [<802764f0>] (process_one_work) from [<80277478>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3440) r10:00000000 r9:87020430 r8:84f1e200 r7:82804d80 r6:ddde4da0 r5:ddde4d80 r4:87020400 [<8027730c>] (worker_thread) from [<802814a4>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:eb30de88 r8:86135300 r7:87020400 r6:8027730c r5:84f1e200 r4:868b56c0 [<80281388>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcfdfb0 to 0xdfcfdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281388 r4:868b56c0 INFO: task kworker/1:7:25918 is blocked on a mutex likely owned by task kworker/1:10:26259. task:kworker/1:10 state:R running task stack:0 pid:26259 tgid:26259 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81aea50c>] (__schedule) from [<81aebd58>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7238) r10:8280c880 r9:84eca4c0 r8:80200c04 r7:dfa21d7c r6:ffffffff r5:84eca4c0 r4:00000000 [<81aebd18>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfa21d48 to 0xdfa21d90) 1d40: c364e000 eac19000 00000000 802387d0 82ad3620 82ad4264 1d60: 7f26e000 eac19000 00000000 00000001 8280c880 dfa21dbc eac19000 dfa21d98 1d80: 8022f700 802387e8 80000013 ffffffff r5:80000013 r4:802387e8 [<8022f6a0>] (flush_tlb_kernel_range) from [<804fd69c>] (__purge_vmap_area_lazy+0x298/0x48c mm/vmalloc.c:2382) [<804fd404>] (__purge_vmap_area_lazy) from [<804fda78>] (_vm_unmap_aliases+0x1e8/0x238 mm/vmalloc.c:2996) r10:00000000 r9:dfa21de0 r8:00000000 r7:ffffffff r6:00000008 r5:dfa21e28 r4:dfa21de0 [<804fd890>] (_vm_unmap_aliases) from [<805016e4>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fd890>] (_vm_unmap_aliases) from [<805016e4>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302ae05 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8689aa40 r4:00000000 [<80501578>] (vfree) from [<8056f870>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:84eca4c0 r8:01800000 r7:00000000 r6:8302ae00 r5:00001000 r4:7f2a0000 [<8056f840>] (execmem_free) from [<803cf288>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:e01a9000 [<803cf278>] (bpf_jit_free_exec) from [<803cf668>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803cf278>] (bpf_jit_free_exec) from [<803cf668>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf604>] (bpf_jit_free) from [<803d067c>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2968) r5:85935394 r4:85935394 [<803d0534>] (bpf_prog_free_deferred) from [<802766b8>] (process_one_work+0x1c8/0x59c kernel/workqueue.c:3276) r7:ddde4d80 r6:8302ae00 r5:85935394 r4:87be3500 [<802764f0>] (process_one_work) from [<80277478>] (process_scheduled_works kernel/workqueue.c:3359 [inline]) [<802764f0>] (process_one_work) from [<80277478>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3440) r10:00000000 r9:87be3530 r8:84eca4c0 r7:82804d80 r6:ddde4da0 r5:ddde4d80 r4:87be3500 [<8027730c>] (worker_thread) from [<802814a4>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:dfc01e88 r8:85af8100 r7:87be3500 r6:8027730c r5:84eca4c0 r4:86852140 [<80281388>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa21fb0 to 0xdfa21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281388 r4:86852140 INFO: task kworker/0:18:26878 blocked for more than 430 seconds. Tainted: G L syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:18 state:D stack:0 pid:26878 tgid:26878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81aea50c>] (__schedule) from [<81aeb920>] (__schedule_loop kernel/sched/core.c:6993 [inline]) [<81aea50c>] (__schedule) from [<81aeb920>] (schedule+0x2c/0x134 kernel/sched/core.c:7008) r10:ea675da4 r9:00000002 r8:60000113 r7:ea675dac r6:82918014 r5:83acb100 r4:83acb100 [<81aeb8f4>] (schedule) from [<81aebaac>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7065) r5:83acb100 r4:82918010 [<81aeba94>] (schedule_preempt_disabled) from [<81aee9f4>] (__mutex_lock_common kernel/locking/mutex.c:692 [inline]) [<81aeba94>] (schedule_preempt_disabled) from [<81aee9f4>] (__mutex_lock.constprop.0+0x480/0x9cc kernel/locking/mutex.c:776) [<81aee574>] (__mutex_lock.constprop.0) from [<81aef014>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1065) r10:8280c82c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea675e28 r4:00000000 [<81aef000>] (__mutex_lock_slowpath) from [<81aef054>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:290) [<81aef018>] (mutex_lock) from [<804fd8ec>] (_vm_unmap_aliases+0x5c/0x238 mm/vmalloc.c:2957) [<804fd890>] (_vm_unmap_aliases) from [<805016e4>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fd890>] (_vm_unmap_aliases) from [<805016e4>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302b005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:868fb8c0 r4:00000000 [<80501578>] (vfree) from [<8056f870>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83acb100 r8:00800000 r7:00000000 r6:8302b000 r5:00001000 r4:7f22e000 [<8056f840>] (execmem_free) from [<803cf288>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:dfcff000 [<803cf278>] (bpf_jit_free_exec) from [<803cf668>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803cf278>] (bpf_jit_free_exec) from [<803cf668>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf604>] (bpf_jit_free) from [<803d067c>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2968) r5:86d19394 r4:86d19394 [<803d0534>] (bpf_prog_free_deferred) from [<802766b8>] (process_one_work+0x1c8/0x59c kernel/workqueue.c:3276) r7:dddd0d80 r6:8302b000 r5:86d19394 r4:85c54e80 [<802764f0>] (process_one_work) from [<80277478>] (process_scheduled_works kernel/workqueue.c:3359 [inline]) [<802764f0>] (process_one_work) from [<80277478>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3440) r10:dddd0d80 r9:85c54eb0 r8:83acb100 r7:82804d80 r6:dddd0da0 r5:dddd0d80 r4:85c54e80 [<8027730c>] (worker_thread) from [<802814a4>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:dfcade88 r8:85a93e00 r7:85c54e80 r6:8027730c r5:83acb100 r4:87d21b00 [<80281388>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea675fb0 to 0xea675ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281388 r4:87d21b00 INFO: task kworker/0:18:26878 is blocked on a mutex likely owned by task kworker/1:10:26259. task:kworker/1:10 state:R running task stack:0 pid:26259 tgid:26259 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81aea50c>] (__schedule) from [<81aebd58>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7238) r10:8280c880 r9:84eca4c0 r8:80200c04 r7:dfa21d7c r6:ffffffff r5:84eca4c0 r4:00000000 [<81aebd18>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfa21d48 to 0xdfa21d90) 1d40: c364e000 eac19000 00000000 802387d0 82ad3620 82ad4264 1d60: 7f26e000 eac19000 00000000 00000001 8280c880 dfa21dbc eac19000 dfa21d98 1d80: 8022f700 802387e8 80000013 ffffffff r5:80000013 r4:802387e8 [<8022f6a0>] (flush_tlb_kernel_range) from [<804fd69c>] (__purge_vmap_area_lazy+0x298/0x48c mm/vmalloc.c:2382) [<804fd404>] (__purge_vmap_area_lazy) from [<804fda78>] (_vm_unmap_aliases+0x1e8/0x238 mm/vmalloc.c:2996) r10:00000000 r9:dfa21de0 r8:00000000 r7:ffffffff r6:00000008 r5:dfa21e28 r4:dfa21de0 [<804fd890>] (_vm_unmap_aliases) from [<805016e4>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fd890>] (_vm_unmap_aliases) from [<805016e4>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302ae05 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8689aa40 r4:00000000 [<80501578>] (vfree) from [<8056f870>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:84eca4c0 r8:01800000 r7:00000000 r6:8302ae00 r5:00001000 r4:7f2a0000 [<8056f840>] (execmem_free) from [<803cf288>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:e01a9000 [<803cf278>] (bpf_jit_free_exec) from [<803cf668>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803cf278>] (bpf_jit_free_exec) from [<803cf668>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf604>] (bpf_jit_free) from [<803d067c>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2968) r5:85935394 r4:85935394 [<803d0534>] (bpf_prog_free_deferred) from [<802766b8>] (process_one_work+0x1c8/0x59c kernel/workqueue.c:3276) r7:ddde4d80 r6:8302ae00 r5:85935394 r4:87be3500 [<802764f0>] (process_one_work) from [<80277478>] (process_scheduled_works kernel/workqueue.c:3359 [inline]) [<802764f0>] (process_one_work) from [<80277478>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3440) r10:00000000 r9:87be3530 r8:84eca4c0 r7:82804d80 r6:ddde4da0 r5:ddde4d80 r4:87be3500 [<8027730c>] (worker_thread) from [<802814a4>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:dfc01e88 r8:85af8100 r7:87be3500 r6:8027730c r5:84eca4c0 r4:86852140 [<80281388>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa21fb0 to 0xdfa21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281388 r4:86852140 INFO: task kworker/0:19:27414 blocked for more than 430 seconds. Tainted: G L syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:19 state:D stack:0 pid:27414 tgid:27414 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81aea50c>] (__schedule) from [<81aeb920>] (__schedule_loop kernel/sched/core.c:6993 [inline]) [<81aea50c>] (__schedule) from [<81aeb920>] (schedule+0x2c/0x134 kernel/sched/core.c:7008) r10:e0155da4 r9:00000002 r8:600f0013 r7:e0155dac r6:82918014 r5:831824c0 r4:831824c0 [<81aeb8f4>] (schedule) from [<81aebaac>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7065) r5:831824c0 r4:82918010 [<81aeba94>] (schedule_preempt_disabled) from [<81aee9f4>] (__mutex_lock_common kernel/locking/mutex.c:692 [inline]) [<81aeba94>] (schedule_preempt_disabled) from [<81aee9f4>] (__mutex_lock.constprop.0+0x480/0x9cc kernel/locking/mutex.c:776) [<81aee574>] (__mutex_lock.constprop.0) from [<81aef014>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1065) r10:8280c82c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0155e28 r4:00000000 [<81aef000>] (__mutex_lock_slowpath) from [<81aef054>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:290) [<81aef018>] (mutex_lock) from [<804fd8ec>] (_vm_unmap_aliases+0x5c/0x238 mm/vmalloc.c:2957) [<804fd890>] (_vm_unmap_aliases) from [<805016e4>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fd890>] (_vm_unmap_aliases) from [<805016e4>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302b005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86d59400 r4:00000000 [<80501578>] (vfree) from [<8056f870>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:831824c0 r8:00800000 r7:00000000 r6:8302b000 r5:00001000 r4:7f292000 [<8056f840>] (execmem_free) from [<803cf288>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:dfb0b000 [<803cf278>] (bpf_jit_free_exec) from [<803cf668>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803cf278>] (bpf_jit_free_exec) from [<803cf668>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf604>] (bpf_jit_free) from [<803d067c>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2968) r5:86cd6394 r4:86cd6394 [<803d0534>] (bpf_prog_free_deferred) from [<802766b8>] (process_one_work+0x1c8/0x59c kernel/workqueue.c:3276) r7:dddd0d80 r6:8302b000 r5:86cd6394 r4:8758a380 [<802764f0>] (process_one_work) from [<80277478>] (process_scheduled_works kernel/workqueue.c:3359 [inline]) [<802764f0>] (process_one_work) from [<80277478>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3440) r10:dddd0d80 r9:8758a3b0 r8:831824c0 r7:82804d80 r6:dddd0da0 r5:dddd0d80 r4:8758a380 [<8027730c>] (worker_thread) from [<802814a4>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:dfcade88 r8:85ce3500 r7:8758a380 r6:8027730c r5:831824c0 r4:87130980 [<80281388>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0155fb0 to 0xe0155ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281388 r4:87130980 INFO: task kworker/0:19:27414 is blocked on a mutex likely owned by task kworker/1:10:26259. task:kworker/1:10 state:R running task stack:0 pid:26259 tgid:26259 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81aea50c>] (__schedule) from [<81aebd58>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7238) r10:8280c880 r9:84eca4c0 r8:80200c04 r7:dfa21d7c r6:ffffffff r5:84eca4c0 r4:00000000 [<81aebd18>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdfa21d48 to 0xdfa21d90) 1d40: c364e000 eac19000 00000000 802387d0 82ad3620 82ad4264 1d60: 7f26e000 eac19000 00000000 00000001 8280c880 dfa21dbc eac19000 dfa21d98 1d80: 8022f700 802387e8 80000013 ffffffff r5:80000013 r4:802387e8 [<8022f6a0>] (flush_tlb_kernel_range) from [<804fd69c>] (__purge_vmap_area_lazy+0x298/0x48c mm/vmalloc.c:2382) [<804fd404>] (__purge_vmap_area_lazy) from [<804fda78>] (_vm_unmap_aliases+0x1e8/0x238 mm/vmalloc.c:2996) r10:00000000 r9:dfa21de0 r8:00000000 r7:ffffffff r6:00000008 r5:dfa21e28 r4:dfa21de0 [<804fd890>] (_vm_unmap_aliases) from [<805016e4>] (vm_reset_perms mm/vmalloc.c:3388 [inline]) [<804fd890>] (_vm_unmap_aliases) from [<805016e4>] (vfree+0x16c/0x210 mm/vmalloc.c:3467) r10:8302ae05 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8689aa40 r4:00000000 [<80501578>] (vfree) from [<8056f870>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:84eca4c0 r8:01800000 r7:00000000 r6:8302ae00 r5:00001000 r4:7f2a0000 [<8056f840>] (execmem_free) from [<803cf288>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:e01a9000 [<803cf278>] (bpf_jit_free_exec) from [<803cf668>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803cf278>] (bpf_jit_free_exec) from [<803cf668>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803cf604>] (bpf_jit_free) from [<803d067c>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2968) r5:85935394 r4:85935394 [<803d0534>] (bpf_prog_free_deferred) from [<802766b8>] (process_one_work+0x1c8/0x59c kernel/workqueue.c:3276) r7:ddde4d80 r6:8302ae00 r5:85935394 r4:87be3500 [<802764f0>] (process_one_work) from [<80277478>] (process_scheduled_works kernel/workqueue.c:3359 [inline]) [<802764f0>] (process_one_work) from [<80277478>] (worker_thread+0x16c/0x318 kernel/workqueue.c:3440) r10:00000000 r9:87be3530 r8:84eca4c0 r7:82804d80 r6:ddde4da0 r5:ddde4d80 r4:87be3500 [<8027730c>] (worker_thread) from [<802814a4>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:dfc01e88 r8:85af8100 r7:87be3500 r6:8027730c r5:84eca4c0 r4:86852140 [<80281388>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa21fb0 to 0xdfa21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281388 r4:86852140 NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 29 Comm: khungtaskd Tainted: G L syzkaller #0 PREEMPT Tainted: [L]=SOFTLOCKUP Hardware name: ARM-Versatile Express Call trace: [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c arch/arm/kernel/traps.c:257) r7:60070093 r6:60070093 r5:822a8764 r4:00000000 [<80201af0>] (show_stack) from [<8021e410>] (__dump_stack lib/dump_stack.c:94 [inline]) [<80201af0>] (show_stack) from [<8021e410>] (dump_stack_lvl+0x5c/0x70 lib/dump_stack.c:120) [<8021e3b4>] (dump_stack_lvl) from [<8021e43c>] (dump_stack+0x18/0x1c lib/dump_stack.c:129) r7:00000000 r6:00070013 r5:00000000 r4:00000001 [<8021e424>] (dump_stack) from [<81ad3f3c>] (nmi_cpu_backtrace+0x150/0x170 lib/nmi_backtrace.c:113) [<81ad3dec>] (nmi_cpu_backtrace) from [<81ad408c>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8 lib/nmi_backtrace.c:62) r7:00000000 r6:8280c550 r5:8281afb8 r4:ffffffff [<81ad3f5c>] (nmi_trigger_cpumask_backtrace) from [<8022f124>] (arch_trigger_cpumask_backtrace+0x18/0x1c arch/arm/kernel/smp.c:852) r9:82ac7834 r8:8280c6d8 r7:00088cde r6:84f1bf44 r5:82804d80 r4:00000048 [<8022f10c>] (arch_trigger_cpumask_backtrace) from [<81adbb7c>] (trigger_all_cpu_backtrace include/linux/nmi.h:161 [inline]) [<8022f10c>] (arch_trigger_cpumask_backtrace) from [<81adbb7c>] (__sys_info lib/sys_info.c:157 [inline]) [<8022f10c>] (arch_trigger_cpumask_backtrace) from [<81adbb7c>] (sys_info+0x68/0xa8 lib/sys_info.c:165) [<81adbb14>] (sys_info) from [<80385270>] (check_hung_uninterruptible_tasks kernel/hung_task.c:346 [inline]) [<81adbb14>] (sys_info) from [<80385270>] (watchdog+0x59c/0x8d8 kernel/hung_task.c:515) r5:82804d80 r4:87065714 [<80384cd4>] (watchdog) from [<802814a4>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:df819e60 r8:83385880 r7:00000000 r6:80384cd4 r5:833d0c40 r4:8332a700 [<80281388>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf8d5fb0 to 0xdf8d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281388 r4:8332a700 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 2806 Comm: pr/ttyAMA-1 Tainted: G L syzkaller #0 PREEMPT Tainted: [L]=SOFTLOCKUP Hardware name: ARM-Versatile Express PC is at __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:179 [inline] PC is at _raw_spin_unlock_irqrestore+0x28/0x54 kernel/locking/spinlock.c:194 LR is at spin_unlock_irqrestore include/linux/spinlock.h:407 [inline] LR is at __uart_port_unlock_irqrestore include/linux/serial_core.h:616 [inline] LR is at pl011_console_device_unlock+0x20/0x24 drivers/tty/serial/amba-pl011.c:2603 pc : [<81af4a00>] lr : [<80acceac>] psr: 60000113 sp : eb501ec8 ip : eb501ed8 fp : eb501ed4 r10: 8295bbb4 r9 : 00000001 r8 : 00000000 r7 : 00000117 r6 : 8295bb18 r5 : 00000000 r4 : 00000001 r3 : 00001953 r2 : 00000000 r1 : 60000113 r0 : 83bca440 Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none Control: 30c5387d Table: 872d3800 DAC: 00000000 Call trace: [<81af49d8>] (_raw_spin_unlock_irqrestore) from [<80acceac>] (spin_unlock_irqrestore include/linux/spinlock.h:407 [inline]) [<81af49d8>] (_raw_spin_unlock_irqrestore) from [<80acceac>] (__uart_port_unlock_irqrestore include/linux/serial_core.h:616 [inline]) [<81af49d8>] (_raw_spin_unlock_irqrestore) from [<80acceac>] (pl011_console_device_unlock+0x20/0x24 drivers/tty/serial/amba-pl011.c:2603) [<80acce8c>] (pl011_console_device_unlock) from [<802e6920>] (nbcon_emit_one+0x88/0x100 kernel/printk/nbcon.c:1165) [<802e6898>] (nbcon_emit_one) from [<802e6ba0>] (nbcon_kthread_func+0x208/0x2ec kernel/printk/nbcon.c:1271) r6:82ac410c r5:8295bb18 r4:84f155c0 [<802e6998>] (nbcon_kthread_func) from [<802814a4>] (kthread+0x11c/0x154 kernel/kthread.c:436) r10:00000000 r9:df8ddb48 r8:84cfb800 r7:8295bb18 r6:802e6998 r5:84f155c0 r4:84d20f80 [<80281388>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb501fb0 to 0xeb501ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281388 r4:84d20f80