INFO: task kworker/1:76:4432 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:76 state:D stack:0 pid:4432 tgid:4432 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643fc>] (__schedule) from [<81a65390>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a643fc>] (__schedule) from [<81a65390>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:dfb3dd84 r9:00000002 r8:60010013 r7:829171a0 r6:dfb3dd8c r5:85901800 r4:85901800 [<81a65364>] (schedule) from [<81a65778>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:85901800 r4:8291719c [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67fd8>] (__mutex_lock.constprop.0) from [<81a68ad0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb3de08 r4:00000000 [<81a68abc>] (__mutex_lock_slowpath) from [<81a68b10>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68ad4>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dcf0c0 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:85901800 r7:00000000 r6:83018600 r5:00001000 r4:7f250000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dffbb000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85ab2f8c r4:85aa6300 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:85ab2f8c r4:85aa6300 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85901800 r8:85aa632c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85aa6300 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85aa6300 r8:80278fec r7:dfb39e60 r6:84e56900 r5:85901800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb3dfb0 to 0xdfb3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85a2d180 INFO: task kworker/1:76:4432 is blocked on a mutex likely owned by task kworker/0:83:4439. task:kworker/0:83 state:R running task stack:0 pid:4439 tgid:4439 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643fc>] (__schedule) from [<81a657c4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:85ad5400 r8:80200c04 r7:ea751d54 r6:ffffffff r5:85ad5400 r4:00000000 [<81a65784>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea751d20 to 0xea751d68) 1d20: c8f9a000 ecbdc000 00000001 80239bf8 7f00b000 00000001 82acb1c4 82aca5a0 1d40: 7f00b000 ecbdc000 8280c9b4 ea751d9c ea751da0 ea751d70 80230af0 80239c10 1d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea751dc0 r5:ea751e08 r4:ea751dc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dd1480 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:85ad5400 r7:00000000 r6:83018400 r5:00001000 r4:7f041000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfba3000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85800b8c r4:85a36480 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:85800b8c r4:85a36480 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85ad5400 r8:85a364ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:85a36480 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85a36480 r8:80278fec r7:df9e1e60 r6:85a36500 r5:85ad5400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea751fb0 to 0xea751ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:84dd15c0 INFO: task kworker/1:77:4433 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:77 state:D stack:0 pid:4433 tgid:4433 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643fc>] (__schedule) from [<81a65390>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a643fc>] (__schedule) from [<81a65390>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:dfb41d84 r9:00000002 r8:60000113 r7:829171a0 r6:dfb41d8c r5:85ad0c00 r4:85ad0c00 [<81a65364>] (schedule) from [<81a65778>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:85ad0c00 r4:8291719c [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67fd8>] (__mutex_lock.constprop.0) from [<81a68ad0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb41e08 r4:00000000 [<81a68abc>] (__mutex_lock_slowpath) from [<81a68b10>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68ad4>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dcf940 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:85ad0c00 r7:00000000 r6:83018600 r5:00001000 r4:7f254000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:e0075000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85a44f8c r4:85aa6f80 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:85a44f8c r4:85aa6f80 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85ad0c00 r8:85aa6fac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85aa6f80 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85aa6f80 r8:80278fec r7:dfb3de60 r6:84e56500 r5:85ad0c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb41fb0 to 0xdfb41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85a2d140 INFO: task kworker/1:77:4433 is blocked on a mutex likely owned by task kworker/0:83:4439. task:kworker/0:83 state:R running task stack:0 pid:4439 tgid:4439 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643fc>] (__schedule) from [<81a657c4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:85ad5400 r8:80200c04 r7:ea751d54 r6:ffffffff r5:85ad5400 r4:00000000 [<81a65784>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea751d20 to 0xea751d68) 1d20: c93d8000 ecbdc000 00000001 80239bf8 7f00b000 00000001 82acb1c4 82aca5a0 1d40: 7f00b000 ecbdc000 8280c9b4 ea751d9c ea751da0 ea751d70 80230af0 80239c10 1d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea751dc0 r5:ea751e08 r4:ea751dc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dd1480 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:85ad5400 r7:00000000 r6:83018400 r5:00001000 r4:7f041000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfba3000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85800b8c r4:85a36480 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:85800b8c r4:85a36480 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85ad5400 r8:85a364ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:85a36480 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85a36480 r8:80278fec r7:df9e1e60 r6:85a36500 r5:85ad5400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea751fb0 to 0xea751ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:84dd15c0 INFO: task kworker/0:84:4440 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:84 state:D stack:0 pid:4440 tgid:4440 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643fc>] (__schedule) from [<81a65390>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a643fc>] (__schedule) from [<81a65390>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:dfbc5d84 r9:00000002 r8:60000113 r7:829171a0 r6:dfbc5d8c r5:85ad4800 r4:85ad4800 [<81a65364>] (schedule) from [<81a65778>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:85ad4800 r4:8291719c [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67fd8>] (__mutex_lock.constprop.0) from [<81a68ad0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbc5e08 r4:00000000 [<81a68abc>] (__mutex_lock_slowpath) from [<81a68b10>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68ad4>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858b8c40 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:85ad4800 r7:00000000 r6:83018400 r5:00001000 r4:7f258000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:e41ab000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85ab3f8c r4:85a36600 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:85ab3f8c r4:85a36600 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85ad4800 r8:85a3662c r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:85a36600 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85a36600 r8:80278fec r7:ea751e60 r6:85a36680 r5:85ad4800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbc5fb0 to 0xdfbc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:84dd15c0 INFO: task kworker/0:84:4440 is blocked on a mutex likely owned by task kworker/0:83:4439. task:kworker/0:83 state:R running task stack:0 pid:4439 tgid:4439 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643fc>] (__schedule) from [<81a657c4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:85ad5400 r8:80200c04 r7:ea751d54 r6:ffffffff r5:85ad5400 r4:00000000 [<81a65784>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea751d20 to 0xea751d68) 1d20: c9984000 ecbdc000 00000001 80239bf8 7f00b000 00000001 82acb1c4 82aca5a0 1d40: 7f00b000 ecbdc000 8280c9b4 ea751d9c ea751da0 ea751d70 80230af0 80239c10 1d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea751dc0 r5:ea751e08 r4:ea751dc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dd1480 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:85ad5400 r7:00000000 r6:83018400 r5:00001000 r4:7f041000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfba3000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85800b8c r4:85a36480 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:85800b8c r4:85a36480 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85ad5400 r8:85a364ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:85a36480 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85a36480 r8:80278fec r7:df9e1e60 r6:85a36500 r5:85ad5400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea751fb0 to 0xea751ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:84dd15c0 INFO: task kworker/0:85:4441 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:85 state:D stack:0 pid:4441 tgid:4441 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643fc>] (__schedule) from [<81a65390>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a643fc>] (__schedule) from [<81a65390>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:dfbd5d84 r9:00000002 r8:60000113 r7:829171a0 r6:dfbd5d8c r5:85ad3c00 r4:85ad3c00 [<81a65364>] (schedule) from [<81a65778>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:85ad3c00 r4:8291719c [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67fd8>] (__mutex_lock.constprop.0) from [<81a68ad0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbd5e08 r4:00000000 [<81a68abc>] (__mutex_lock_slowpath) from [<81a68b10>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68ad4>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857a4640 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:85ad3c00 r7:00000000 r6:83018400 r5:00001000 r4:7f24c000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfbed000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:859fbf8c r4:85a36780 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:859fbf8c r4:85a36780 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85ad3c00 r8:85a367ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:85a36780 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85a36780 r8:80278fec r7:dfbc5e60 r6:85a36800 r5:85ad3c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbd5fb0 to 0xdfbd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:84dd1400 INFO: task kworker/0:85:4441 is blocked on a mutex likely owned by task kworker/0:83:4439. task:kworker/0:83 state:R running task stack:0 pid:4439 tgid:4439 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643fc>] (__schedule) from [<81a657c4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:85ad5400 r8:80200c04 r7:ea751d54 r6:ffffffff r5:85ad5400 r4:00000000 [<81a65784>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea751d20 to 0xea751d68) 1d20: c9f31000 ecbdc000 00000001 80239bf8 7f00b000 00000001 82acb1c4 82aca5a0 1d40: 7f00b000 ecbdc000 8280c9b4 ea751d9c ea751da0 ea751d70 80230af0 80239c10 1d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea751dc0 r5:ea751e08 r4:ea751dc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dd1480 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:85ad5400 r7:00000000 r6:83018400 r5:00001000 r4:7f041000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfba3000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85800b8c r4:85a36480 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:85800b8c r4:85a36480 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85ad5400 r8:85a364ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:85a36480 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85a36480 r8:80278fec r7:df9e1e60 r6:85a36500 r5:85ad5400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea751fb0 to 0xea751ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:84dd15c0 INFO: task kworker/0:86:4445 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:86 state:D stack:0 pid:4445 tgid:4445 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643fc>] (__schedule) from [<81a65390>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a643fc>] (__schedule) from [<81a65390>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:dfbf1d84 r9:00000002 r8:60000113 r7:829171a0 r6:dfbf1d8c r5:85ad6000 r4:85ad6000 [<81a65364>] (schedule) from [<81a65778>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:85ad6000 r4:8291719c [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67fd8>] (__mutex_lock.constprop.0) from [<81a68ad0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbf1e08 r4:00000000 [<81a68abc>] (__mutex_lock_slowpath) from [<81a68b10>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68ad4>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a2d9c0 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:85ad6000 r7:00000000 r6:83018400 r5:00001000 r4:7f24e000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfc39000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:859f8b8c r4:85a36180 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:859f8b8c r4:85a36180 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85ad6000 r8:85a361ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:85a36180 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85a36180 r8:80278fec r7:dfbc5e60 r6:85a36980 r5:85ad6000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbf1fb0 to 0xdfbf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85a2de00 INFO: task kworker/0:86:4445 is blocked on a mutex likely owned by task kworker/0:83:4439. task:kworker/0:83 state:R running task stack:0 pid:4439 tgid:4439 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643fc>] (__schedule) from [<81a657c4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:85ad5400 r8:80200c04 r7:ea751d54 r6:ffffffff r5:85ad5400 r4:00000000 [<81a65784>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea751d20 to 0xea751d68) 1d20: c9f31000 ecbdc000 00000001 80239bf8 7f00b000 00000001 82acb1c4 82aca5a0 1d40: 7f00b000 ecbdc000 8280c9b4 ea751d9c ea751da0 ea751d70 80230af0 80239c10 1d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea751dc0 r5:ea751e08 r4:ea751dc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dd1480 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:85ad5400 r7:00000000 r6:83018400 r5:00001000 r4:7f041000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfba3000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85800b8c r4:85a36480 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:85800b8c r4:85a36480 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85ad5400 r8:85a364ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:85a36480 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85a36480 r8:80278fec r7:df9e1e60 r6:85a36500 r5:85ad5400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea751fb0 to 0xea751ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:84dd15c0 INFO: task kworker/0:87:4448 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:87 state:D stack:0 pid:4448 tgid:4448 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643fc>] (__schedule) from [<81a65390>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a643fc>] (__schedule) from [<81a65390>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:dfad1d84 r9:00000002 r8:60000113 r7:829171a0 r6:dfad1d8c r5:85ad0000 r4:85ad0000 [<81a65364>] (schedule) from [<81a65778>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:85ad0000 r4:8291719c [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67fd8>] (__mutex_lock.constprop.0) from [<81a68ad0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfad1e08 r4:00000000 [<81a68abc>] (__mutex_lock_slowpath) from [<81a68b10>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68ad4>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ea0740 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:85ad0000 r7:00000000 r6:83018400 r5:00001000 r4:7f27a000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:e41c1000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:859fb38c r4:85a36b80 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:859fb38c r4:85a36b80 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85ad0000 r8:85a36bac r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:85a36b80 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85a36b80 r8:80278fec r7:dfbc5e60 r6:85a36c00 r5:85ad0000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfad1fb0 to 0xdfad1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85aa3280 INFO: task kworker/0:87:4448 is blocked on a mutex likely owned by task kworker/0:83:4439. task:kworker/0:83 state:R running task stack:0 pid:4439 tgid:4439 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643fc>] (__schedule) from [<81a657c4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:85ad5400 r8:80200c04 r7:ea751d54 r6:ffffffff r5:85ad5400 r4:00000000 [<81a65784>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea751d20 to 0xea751d68) 1d20: ca155000 ecbdc000 00000001 80239bf8 7f00b000 00000001 82acb1c4 82aca5a0 1d40: 7f00b000 ecbdc000 8280c9b4 ea751d9c ea751da0 ea751d70 80230af0 80239c10 1d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea751dc0 r5:ea751e08 r4:ea751dc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dd1480 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:85ad5400 r7:00000000 r6:83018400 r5:00001000 r4:7f041000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfba3000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85800b8c r4:85a36480 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:85800b8c r4:85a36480 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85ad5400 r8:85a364ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:85a36480 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85a36480 r8:80278fec r7:df9e1e60 r6:85a36500 r5:85ad5400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea751fb0 to 0xea751ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:84dd15c0 INFO: task kworker/1:78:4455 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:78 state:D stack:0 pid:4455 tgid:4455 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643fc>] (__schedule) from [<81a65390>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a643fc>] (__schedule) from [<81a65390>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:dffb9d84 r9:00000002 r8:60000113 r7:829171a0 r6:dffb9d8c r5:84af0c00 r4:84af0c00 [<81a65364>] (schedule) from [<81a65778>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:84af0c00 r4:8291719c [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67fd8>] (__mutex_lock.constprop.0) from [<81a68ad0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffb9e08 r4:00000000 [<81a68abc>] (__mutex_lock_slowpath) from [<81a68b10>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68ad4>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858d0a80 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84af0c00 r7:00000000 r6:83018600 r5:00001000 r4:7f256000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:e00e1000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:847ec38c r4:85997c00 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:847ec38c r4:85997c00 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84af0c00 r8:85997c2c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85997c00 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85997c00 r8:80278fec r7:dfb41e60 r6:849c0f00 r5:84af0c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffb9fb0 to 0xdffb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:84dcf040 INFO: task kworker/1:78:4455 is blocked on a mutex likely owned by task kworker/0:83:4439. task:kworker/0:83 state:R running task stack:0 pid:4439 tgid:4439 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643fc>] (__schedule) from [<81a657c4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:85ad5400 r8:80200c04 r7:ea751d54 r6:ffffffff r5:85ad5400 r4:00000000 [<81a65784>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea751d20 to 0xea751d68) 1d20: ca977000 ecbdc000 00000001 80239bf8 7f00b000 00000001 82acb1c4 82aca5a0 1d40: 7f00b000 ecbdc000 8280c9b4 ea751d9c ea751da0 ea751d70 80230af0 80239c10 1d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea751dc0 r5:ea751e08 r4:ea751dc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dd1480 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:85ad5400 r7:00000000 r6:83018400 r5:00001000 r4:7f041000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfba3000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85800b8c r4:85a36480 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:85800b8c r4:85a36480 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85ad5400 r8:85a364ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:85a36480 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85a36480 r8:80278fec r7:df9e1e60 r6:85a36500 r5:85ad5400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea751fb0 to 0xea751ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:84dd15c0 INFO: task kworker/1:79:4462 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:79 state:D stack:0 pid:4462 tgid:4462 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643fc>] (__schedule) from [<81a65390>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a643fc>] (__schedule) from [<81a65390>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:dff7dd84 r9:00000002 r8:60000013 r7:829171a0 r6:dff7dd8c r5:84af0000 r4:84af0000 [<81a65364>] (schedule) from [<81a65778>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:84af0000 r4:8291719c [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67fd8>] (__mutex_lock.constprop.0) from [<81a68ad0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff7de08 r4:00000000 [<81a68abc>] (__mutex_lock_slowpath) from [<81a68b10>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68ad4>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8594b2c0 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84af0000 r7:00000000 r6:83018600 r5:00001000 r4:7f27e000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea9ed000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:859fab8c r4:85a30b00 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:859fab8c r4:85a30b00 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84af0000 r8:85a30b2c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85a30b00 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85a30b00 r8:80278fec r7:dfb41e60 r6:85a30c00 r5:84af0000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff7dfb0 to 0xdff7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:858d0a00 INFO: task kworker/1:79:4462 is blocked on a mutex likely owned by task kworker/0:83:4439. task:kworker/0:83 state:R running task stack:0 pid:4439 tgid:4439 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643fc>] (__schedule) from [<81a657c4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:85ad5400 r8:80200c04 r7:ea751d54 r6:ffffffff r5:85ad5400 r4:00000000 [<81a65784>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea751d20 to 0xea751d68) 1d20: ce872000 ecbdc000 00000001 80239bf8 7f00b000 00000001 82acb1c4 82aca5a0 1d40: 7f00b000 ecbdc000 8280c9b4 ea751d9c ea751da0 ea751d70 80230af0 80239c10 1d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea751dc0 r5:ea751e08 r4:ea751dc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dd1480 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:85ad5400 r7:00000000 r6:83018400 r5:00001000 r4:7f041000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfba3000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85800b8c r4:85a36480 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:85800b8c r4:85a36480 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85ad5400 r8:85a364ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:85a36480 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85a36480 r8:80278fec r7:df9e1e60 r6:85a36500 r5:85ad5400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea751fb0 to 0xea751ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:84dd15c0 INFO: task kworker/0:88:4463 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:88 state:D stack:0 pid:4463 tgid:4463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643fc>] (__schedule) from [<81a65390>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a643fc>] (__schedule) from [<81a65390>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ea8a1d84 r9:00000002 r8:60010013 r7:829171a0 r6:ea8a1d8c r5:83a38000 r4:83a38000 [<81a65364>] (schedule) from [<81a65778>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:83a38000 r4:8291719c [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67fd8>] (__mutex_lock.constprop.0) from [<81a68ad0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8a1e08 r4:00000000 [<81a68abc>] (__mutex_lock_slowpath) from [<81a68b10>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68ad4>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8567bec0 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:83a38000 r7:00000000 r6:83018400 r5:00001000 r4:7f284000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:eaa03000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85ab038c r4:85a36f00 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:85ab038c r4:85a36f00 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:83a38000 r8:85a36f2c r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:85a36f00 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85a36f00 r8:80278fec r7:dfbc5e60 r6:85a36f80 r5:83a38000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea8a1fb0 to 0xea8a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:84ea0800 INFO: task kworker/0:88:4463 is blocked on a mutex likely owned by task kworker/0:83:4439. task:kworker/0:83 state:R running task stack:0 pid:4439 tgid:4439 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643fc>] (__schedule) from [<81a657c4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:85ad5400 r8:80200c04 r7:ea751d54 r6:ffffffff r5:85ad5400 r4:00000000 [<81a65784>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea751d20 to 0xea751d68) 1d20: ce872000 ecbdc000 00000001 80239bf8 7f00b000 00000001 82acb1c4 82aca5a0 1d40: 7f00b000 ecbdc000 8280c9b4 ea751d9c ea751da0 ea751d70 80230af0 80239c10 1d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea751dc0 r5:ea751e08 r4:ea751dc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dd1480 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:85ad5400 r7:00000000 r6:83018400 r5:00001000 r4:7f041000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfba3000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85800b8c r4:85a36480 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:85800b8c r4:85a36480 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85ad5400 r8:85a364ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:85a36480 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85a36480 r8:80278fec r7:df9e1e60 r6:85a36500 r5:85ad5400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea751fb0 to 0xea751ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:84dd15c0 INFO: task kworker/0:89:4465 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:89 state:D stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643fc>] (__schedule) from [<81a65390>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a643fc>] (__schedule) from [<81a65390>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:e012dd84 r9:00000002 r8:60000113 r7:829171a0 r6:e012dd8c r5:84af4800 r4:84af4800 [<81a65364>] (schedule) from [<81a65778>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:84af4800 r4:8291719c [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67fd8>] (__mutex_lock.constprop.0) from [<81a68ad0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e012de08 r4:00000000 [<81a68abc>] (__mutex_lock_slowpath) from [<81a68b10>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68ad4>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84eb4040 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:84af4800 r7:00000000 r6:83018400 r5:00001000 r4:7f252000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:e0033000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:859e238c r4:85a36e80 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:859e238c r4:85a36e80 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84af4800 r8:85a36eac r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:85a36e80 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85a36e80 r8:80278fec r7:ea8a1e60 r6:849d0e80 r5:84af4800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe012dfb0 to 0xe012dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:849461c0 INFO: task kworker/0:89:4465 is blocked on a mutex likely owned by task kworker/0:83:4439. task:kworker/0:83 state:R running task stack:0 pid:4439 tgid:4439 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643fc>] (__schedule) from [<81a657c4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:85ad5400 r8:80200c04 r7:ea751d54 r6:ffffffff r5:85ad5400 r4:00000000 [<81a65784>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea751d20 to 0xea751d68) 1d20: cf29f000 ecbdc000 00000001 80239bf8 7f00b000 00000001 82acb1c4 82aca5a0 1d40: 7f00b000 ecbdc000 8280c9b4 ea751d9c ea751da0 ea751d70 80230af0 80239c10 1d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea751dc0 r5:ea751e08 r4:ea751dc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dd1480 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:85ad5400 r7:00000000 r6:83018400 r5:00001000 r4:7f041000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfba3000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85800b8c r4:85a36480 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:85800b8c r4:85a36480 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85ad5400 r8:85a364ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:85a36480 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85a36480 r8:80278fec r7:df9e1e60 r6:85a36500 r5:85ad5400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea751fb0 to 0xea751ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:84dd15c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:90:4469 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:90 state:D stack:0 pid:4469 tgid:4469 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643fc>] (__schedule) from [<81a65390>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a643fc>] (__schedule) from [<81a65390>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:dfbf9d84 r9:00000002 r8:60070113 r7:829171a0 r6:dfbf9d8c r5:83abe000 r4:83abe000 [<81a65364>] (schedule) from [<81a65778>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:83abe000 r4:8291719c [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67fd8>] (__mutex_lock.constprop.0) from [<81a68ad0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbf9e08 r4:00000000 [<81a68abc>] (__mutex_lock_slowpath) from [<81a68b10>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68ad4>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858bc0c0 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:83abe000 r7:00000000 r6:83018400 r5:00001000 r4:7f27c000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea985000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85ab338c r4:85a36200 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:85ab338c r4:85a36200 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:83abe000 r8:85a3622c r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:85a36200 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85a36200 r8:80278fec r7:ea8a1e60 r6:85a30b80 r5:83abe000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbf9fb0 to 0xdfbf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85a2dcc0 INFO: task kworker/0:90:4469 is blocked on a mutex likely owned by task kworker/0:83:4439. task:kworker/0:83 state:R running task stack:0 pid:4439 tgid:4439 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643fc>] (__schedule) from [<81a657c4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:85ad5400 r8:80200c04 r7:ea751d54 r6:ffffffff r5:85ad5400 r4:00000000 [<81a65784>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea751d20 to 0xea751d68) 1d20: cf29f000 ecbdc000 00000001 80239bf8 7f00b000 00000001 82acb1c4 82aca5a0 1d40: 7f00b000 ecbdc000 8280c9b4 ea751d9c ea751da0 ea751d70 80230af0 80239c10 1d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea751dc0 r5:ea751e08 r4:ea751dc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dd1480 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:85ad5400 r7:00000000 r6:83018400 r5:00001000 r4:7f041000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfba3000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85800b8c r4:85a36480 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:85800b8c r4:85a36480 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85ad5400 r8:85a364ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:85a36480 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85a36480 r8:80278fec r7:df9e1e60 r6:85a36500 r5:85ad5400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea751fb0 to 0xea751ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:84dd15c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:80:4470 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:80 state:D stack:0 pid:4470 tgid:4470 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643fc>] (__schedule) from [<81a65390>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a643fc>] (__schedule) from [<81a65390>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:dff51d84 r9:00000002 r8:60000113 r7:829171a0 r6:dff51d8c r5:85832400 r4:85832400 [<81a65364>] (schedule) from [<81a65778>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:85832400 r4:8291719c [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67fd8>] (__mutex_lock.constprop.0) from [<81a68ad0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff51e08 r4:00000000 [<81a68abc>] (__mutex_lock_slowpath) from [<81a68b10>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68ad4>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dc4540 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:85832400 r7:00000000 r6:83018600 r5:00001000 r4:7f28c000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:eab0b000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:859e7b8c r4:84efb380 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:859e7b8c r4:84efb380 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85832400 r8:84efb3ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:84efb380 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84efb380 r8:80278fec r7:dff7de60 r6:84e0e980 r5:85832400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff51fb0 to 0xdff51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:84dcf280 INFO: task kworker/1:80:4470 is blocked on a mutex likely owned by task kworker/0:83:4439. task:kworker/0:83 state:R running task stack:0 pid:4439 tgid:4439 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643fc>] (__schedule) from [<81a657c4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:85ad5400 r8:80200c04 r7:ea751d54 r6:ffffffff r5:85ad5400 r4:00000000 [<81a65784>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea751d20 to 0xea751d68) 1d20: cf854000 ecbdc000 00000001 80239bf8 7f00b000 00000001 82acb1c4 82aca5a0 1d40: 7f00b000 ecbdc000 8280c9b4 ea751d9c ea751da0 ea751d70 80230af0 80239c10 1d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea751dc0 r5:ea751e08 r4:ea751dc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dd1480 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:85ad5400 r7:00000000 r6:83018400 r5:00001000 r4:7f041000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfba3000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85800b8c r4:85a36480 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:85800b8c r4:85a36480 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85ad5400 r8:85a364ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:85a36480 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85a36480 r8:80278fec r7:df9e1e60 r6:85a36500 r5:85ad5400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea751fb0 to 0xea751ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:84dd15c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:91:4478 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:91 state:D stack:0 pid:4478 tgid:4478 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643fc>] (__schedule) from [<81a65390>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a643fc>] (__schedule) from [<81a65390>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ea8b9d84 r9:00000002 r8:60000113 r7:829171a0 r6:ea8b9d8c r5:85ad6c00 r4:85ad6c00 [<81a65364>] (schedule) from [<81a65778>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:85ad6c00 r4:8291719c [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67fd8>] (__mutex_lock.constprop.0) from [<81a68ad0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8b9e08 r4:00000000 [<81a68abc>] (__mutex_lock_slowpath) from [<81a68b10>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68ad4>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b76ac0 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:85ad6c00 r7:00000000 r6:83018400 r5:00001000 r4:7f02f000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea449000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:859e1b8c r4:85a36100 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:859e1b8c r4:85a36100 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85ad6c00 r8:85a3612c r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:85a36100 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85a36100 r8:80278fec r7:ea8a1e60 r6:85a36d80 r5:85ad6c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea8b9fb0 to 0xea8b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:8599ee00 INFO: task kworker/0:91:4478 is blocked on a mutex likely owned by task kworker/0:83:4439. task:kworker/0:83 state:R running task stack:0 pid:4439 tgid:4439 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643fc>] (__schedule) from [<81a657c4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:85ad5400 r8:80200c04 r7:ea751d54 r6:ffffffff r5:85ad5400 r4:00000000 [<81a65784>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea751d20 to 0xea751d68) 1d20: cfb8a000 ecbdc000 00000001 80239bf8 7f00b000 00000001 82acb1c4 82aca5a0 1d40: 7f00b000 ecbdc000 8280c9b4 ea751d9c ea751da0 ea751d70 80230af0 80239c10 1d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea751dc0 r5:ea751e08 r4:ea751dc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dd1480 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:85ad5400 r7:00000000 r6:83018400 r5:00001000 r4:7f041000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfba3000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85800b8c r4:85a36480 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:85800b8c r4:85a36480 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85ad5400 r8:85a364ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:85a36480 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85a36480 r8:80278fec r7:df9e1e60 r6:85a36500 r5:85ad5400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea751fb0 to 0xea751ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:84dd15c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:92:4482 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:92 state:D stack:0 pid:4482 tgid:4482 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643fc>] (__schedule) from [<81a65390>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a643fc>] (__schedule) from [<81a65390>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ea8a9d84 r9:00000002 r8:60000113 r7:829171a0 r6:ea8a9d8c r5:85ad1800 r4:85ad1800 [<81a65364>] (schedule) from [<81a65778>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:85ad1800 r4:8291719c [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67fd8>] (__mutex_lock.constprop.0) from [<81a68ad0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8a9e08 r4:00000000 [<81a68abc>] (__mutex_lock_slowpath) from [<81a68b10>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68ad4>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85843840 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:85ad1800 r7:00000000 r6:83018400 r5:00001000 r4:7f282000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea9ff000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85ab378c r4:85a36400 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:85ab378c r4:85a36400 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85ad1800 r8:85a3642c r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:85a36400 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85a36400 r8:80278fec r7:ea8a1e60 r6:85a36b00 r5:85ad1800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea8a9fb0 to 0xea8a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:8599e780 INFO: task kworker/0:92:4482 is blocked on a mutex likely owned by task kworker/0:83:4439. task:kworker/0:83 state:R running task stack:0 pid:4439 tgid:4439 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643fc>] (__schedule) from [<81a657c4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:85ad5400 r8:80200c04 r7:ea751d54 r6:ffffffff r5:85ad5400 r4:00000000 [<81a65784>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea751d20 to 0xea751d68) 1d20: cfb8a000 ecbdc000 00000001 80239bf8 7f00b000 00000001 82acb1c4 82aca5a0 1d40: 7f00b000 ecbdc000 8280c9b4 ea751d9c ea751da0 ea751d70 80230af0 80239c10 1d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea751dc0 r5:ea751e08 r4:ea751dc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dd1480 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:85ad5400 r7:00000000 r6:83018400 r5:00001000 r4:7f041000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfba3000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85800b8c r4:85a36480 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:85800b8c r4:85a36480 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85ad5400 r8:85a364ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:85a36480 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85a36480 r8:80278fec r7:df9e1e60 r6:85a36500 r5:85ad5400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea751fb0 to 0xea751ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:84dd15c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:81:4487 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:81 state:D stack:0 pid:4487 tgid:4487 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643fc>] (__schedule) from [<81a65390>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a643fc>] (__schedule) from [<81a65390>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ea8b1d84 r9:00000002 r8:60000113 r7:829171a0 r6:ea8b1d8c r5:84ba2400 r4:84ba2400 [<81a65364>] (schedule) from [<81a65778>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:84ba2400 r4:8291719c [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67fd8>] (__mutex_lock.constprop.0) from [<81a68ad0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8b1e08 r4:00000000 [<81a68abc>] (__mutex_lock_slowpath) from [<81a68b10>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68ad4>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858714c0 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84ba2400 r7:00000000 r6:83018600 r5:00001000 r4:7f280000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea9f5000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:859fa78c r4:84e0ef80 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:859fa78c r4:84e0ef80 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84ba2400 r8:84e0efac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:84e0ef80 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84e0ef80 r8:80278fec r7:dff51e60 r6:849d0f00 r5:84ba2400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea8b1fb0 to 0xea8b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:84ea0800 INFO: task kworker/1:81:4487 is blocked on a mutex likely owned by task kworker/0:83:4439. task:kworker/0:83 state:R running task stack:0 pid:4439 tgid:4439 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643fc>] (__schedule) from [<81a657c4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:85ad5400 r8:80200c04 r7:ea751d54 r6:ffffffff r5:85ad5400 r4:00000000 [<81a65784>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea751d20 to 0xea751d68) 1d20: cfcbf000 ecbdc000 00000001 80239bf8 7f00b000 00000001 82acb1c4 82aca5a0 1d40: 7f00b000 ecbdc000 8280c9b4 ea751d9c ea751da0 ea751d70 80230af0 80239c10 1d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea751dc0 r5:ea751e08 r4:ea751dc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dd1480 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:85ad5400 r7:00000000 r6:83018400 r5:00001000 r4:7f041000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfba3000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85800b8c r4:85a36480 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:85800b8c r4:85a36480 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85ad5400 r8:85a364ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:85a36480 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85a36480 r8:80278fec r7:df9e1e60 r6:85a36500 r5:85ad5400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea751fb0 to 0xea751ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:84dd15c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:82:4488 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:82 state:D stack:0 pid:4488 tgid:4488 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643fc>] (__schedule) from [<81a65390>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a643fc>] (__schedule) from [<81a65390>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ea9f1d84 r9:00000002 r8:60000013 r7:829171a0 r6:ea9f1d8c r5:84ba3000 r4:84ba3000 [<81a65364>] (schedule) from [<81a65778>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:84ba3000 r4:8291719c [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67fd8>] (__mutex_lock.constprop.0) from [<81a68ad0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9f1e08 r4:00000000 [<81a68abc>] (__mutex_lock_slowpath) from [<81a68b10>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68ad4>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa2540 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84ba3000 r7:00000000 r6:83018600 r5:00001000 r4:7f286000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:eaa31000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:859f938c r4:83ca1200 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:859f938c r4:83ca1200 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84ba3000 r8:83ca122c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:83ca1200 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:83ca1200 r8:80278fec r7:dff51e60 r6:84e0eb00 r5:84ba3000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9f1fb0 to 0xea9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:838a4a80 INFO: task kworker/1:82:4488 is blocked on a mutex likely owned by task kworker/0:83:4439. task:kworker/0:83 state:R running task stack:0 pid:4439 tgid:4439 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643fc>] (__schedule) from [<81a657c4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:85ad5400 r8:80200c04 r7:ea751d54 r6:ffffffff r5:85ad5400 r4:00000000 [<81a65784>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea751d20 to 0xea751d68) 1d20: d01c2000 ecbdc000 00000001 80239bf8 7f00b000 00000001 82acb1c4 82aca5a0 1d40: 7f00b000 ecbdc000 8280c9b4 ea751d9c ea751da0 ea751d70 80230af0 80239c10 1d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea751dc0 r5:ea751e08 r4:ea751dc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dd1480 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:85ad5400 r7:00000000 r6:83018400 r5:00001000 r4:7f041000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfba3000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85800b8c r4:85a36480 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:85800b8c r4:85a36480 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85ad5400 r8:85a364ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:85a36480 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85a36480 r8:80278fec r7:df9e1e60 r6:85a36500 r5:85ad5400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea751fb0 to 0xea751ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:84dd15c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:83:4491 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:83 state:D stack:0 pid:4491 tgid:4491 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643fc>] (__schedule) from [<81a65390>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a643fc>] (__schedule) from [<81a65390>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:eaa29d84 r9:00000002 r8:60000113 r7:829171a0 r6:eaa29d8c r5:84ba0c00 r4:84ba0c00 [<81a65364>] (schedule) from [<81a65778>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:84ba0c00 r4:8291719c [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67fd8>] (__mutex_lock.constprop.0) from [<81a68ad0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa29e08 r4:00000000 [<81a68abc>] (__mutex_lock_slowpath) from [<81a68b10>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68ad4>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858c3900 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84ba0c00 r7:00000000 r6:83018600 r5:00001000 r4:7f288000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:eaa39000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:859e278c r4:85b7a280 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:859e278c r4:85b7a280 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84ba0c00 r8:85b7a2ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85b7a280 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85b7a280 r8:80278fec r7:dff51e60 r6:85b7a300 r5:84ba0c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa29fb0 to 0xeaa29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85a1eb40 INFO: task kworker/1:83:4491 is blocked on a mutex likely owned by task kworker/0:83:4439. task:kworker/0:83 state:R running task stack:0 pid:4439 tgid:4439 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643fc>] (__schedule) from [<81a657c4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:85ad5400 r8:80200c04 r7:ea751d54 r6:ffffffff r5:85ad5400 r4:00000000 [<81a65784>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea751d20 to 0xea751d68) 1d20: d01c2000 ecbdc000 00000001 80239bf8 7f00b000 00000001 82acb1c4 82aca5a0 1d40: 7f00b000 ecbdc000 8280c9b4 ea751d9c ea751da0 ea751d70 80230af0 80239c10 1d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea751dc0 r5:ea751e08 r4:ea751dc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dd1480 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:85ad5400 r7:00000000 r6:83018400 r5:00001000 r4:7f041000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfba3000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85800b8c r4:85a36480 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:85800b8c r4:85a36480 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85ad5400 r8:85a364ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:85a36480 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85a36480 r8:80278fec r7:df9e1e60 r6:85a36500 r5:85ad5400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea751fb0 to 0xea751ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:84dd15c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:93:4493 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:93 state:D stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643fc>] (__schedule) from [<81a65390>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a643fc>] (__schedule) from [<81a65390>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:eaa2dd84 r9:00000002 r8:60000013 r7:829171a0 r6:eaa2dd8c r5:84ba4800 r4:84ba4800 [<81a65364>] (schedule) from [<81a65778>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:84ba4800 r4:8291719c [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67fd8>] (__mutex_lock.constprop.0) from [<81a68ad0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa2de08 r4:00000000 [<81a68abc>] (__mutex_lock_slowpath) from [<81a68b10>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68ad4>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dcdb00 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:84ba4800 r7:00000000 r6:83018400 r5:00001000 r4:7f28a000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:eaad1000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:859e538c r4:85a76400 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:859e538c r4:85a76400 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84ba4800 r8:85a7642c r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:85a76400 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85a76400 r8:80278fec r7:ea8b9e60 r6:85b7a100 r5:84ba4800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa2dfb0 to 0xeaa2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:84dc4440 INFO: task kworker/0:93:4493 is blocked on a mutex likely owned by task kworker/0:83:4439. task:kworker/0:83 state:R running task stack:0 pid:4439 tgid:4439 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643fc>] (__schedule) from [<81a657c4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:85ad5400 r8:80200c04 r7:ea751d54 r6:ffffffff r5:85ad5400 r4:00000000 [<81a65784>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea751d20 to 0xea751d68) 1d20: d0554000 ecbdc000 00000001 80239bf8 7f00b000 00000001 82acb1c4 82aca5a0 1d40: 7f00b000 ecbdc000 8280c9b4 ea751d9c ea751da0 ea751d70 80230af0 80239c10 1d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea751dc0 r5:ea751e08 r4:ea751dc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dd1480 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:85ad5400 r7:00000000 r6:83018400 r5:00001000 r4:7f041000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfba3000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85800b8c r4:85a36480 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:85800b8c r4:85a36480 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85ad5400 r8:85a364ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:85a36480 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85a36480 r8:80278fec r7:df9e1e60 r6:85a36500 r5:85ad5400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea751fb0 to 0xea751ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:84dd15c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:84:4496 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:84 state:D stack:0 pid:4496 tgid:4496 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643fc>] (__schedule) from [<81a65390>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a643fc>] (__schedule) from [<81a65390>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:eaa91d84 r9:00000002 r8:60000113 r7:829171a0 r6:eaa91d8c r5:84ba5400 r4:84ba5400 [<81a65364>] (schedule) from [<81a65778>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:84ba5400 r4:8291719c [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67fd8>] (__mutex_lock.constprop.0) from [<81a68ad0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa91e08 r4:00000000 [<81a68abc>] (__mutex_lock_slowpath) from [<81a68b10>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68ad4>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84795d80 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84ba5400 r7:00000000 r6:83018600 r5:00001000 r4:7f029000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea3bf000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85bccb8c r4:85b7a400 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:85bccb8c r4:85b7a400 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84ba5400 r8:85b7a42c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85b7a400 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85b7a400 r8:80278fec r7:dff51e60 r6:85b7a480 r5:84ba5400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa91fb0 to 0xeaa91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:84de2740 INFO: task kworker/1:84:4496 is blocked on a mutex likely owned by task kworker/0:83:4439. task:kworker/0:83 state:R running task stack:0 pid:4439 tgid:4439 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643fc>] (__schedule) from [<81a657c4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:85ad5400 r8:80200c04 r7:ea751d54 r6:ffffffff r5:85ad5400 r4:00000000 [<81a65784>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea751d20 to 0xea751d68) 1d20: d0554000 ecbdc000 00000001 80239bf8 7f00b000 00000001 82acb1c4 82aca5a0 1d40: 7f00b000 ecbdc000 8280c9b4 ea751d9c ea751da0 ea751d70 80230af0 80239c10 1d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea751dc0 r5:ea751e08 r4:ea751dc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dd1480 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:85ad5400 r7:00000000 r6:83018400 r5:00001000 r4:7f041000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfba3000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85800b8c r4:85a36480 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:85800b8c r4:85a36480 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85ad5400 r8:85a364ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:85a36480 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85a36480 r8:80278fec r7:df9e1e60 r6:85a36500 r5:85ad5400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea751fb0 to 0xea751ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:84dd15c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:85:4501 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:85 state:D stack:0 pid:4501 tgid:4501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643fc>] (__schedule) from [<81a65390>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a643fc>] (__schedule) from [<81a65390>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:eaad9d84 r9:00000002 r8:60000013 r7:829171a0 r6:eaad9d8c r5:84ba6c00 r4:84ba6c00 [<81a65364>] (schedule) from [<81a65778>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:84ba6c00 r4:8291719c [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67fd8>] (__mutex_lock.constprop.0) from [<81a68ad0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaad9e08 r4:00000000 [<81a68abc>] (__mutex_lock_slowpath) from [<81a68b10>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68ad4>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84795700 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84ba6c00 r7:00000000 r6:83018600 r5:00001000 r4:7f02b000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea423000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85bccf8c r4:85b7a600 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:85bccf8c r4:85b7a600 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84ba6c00 r8:85b7a62c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85b7a600 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85b7a600 r8:80278fec r7:eaa91e60 r6:85b7a680 r5:84ba6c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaad9fb0 to 0xeaad9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:8560a800 INFO: task kworker/1:85:4501 is blocked on a mutex likely owned by task kworker/0:83:4439. task:kworker/0:83 state:R running task stack:0 pid:4439 tgid:4439 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643fc>] (__schedule) from [<81a657c4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:85ad5400 r8:80200c04 r7:ea751d54 r6:ffffffff r5:85ad5400 r4:00000000 [<81a65784>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea751d20 to 0xea751d68) 1d20: d0554000 ecbdc000 00000001 80239bf8 7f00b000 00000001 82acb1c4 82aca5a0 1d40: 7f00b000 ecbdc000 8280c9b4 ea751d9c ea751da0 ea751d70 80230af0 80239c10 1d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea751dc0 r5:ea751e08 r4:ea751dc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dd1480 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:85ad5400 r7:00000000 r6:83018400 r5:00001000 r4:7f041000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfba3000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85800b8c r4:85a36480 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:85800b8c r4:85a36480 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85ad5400 r8:85a364ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:85a36480 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85a36480 r8:80278fec r7:df9e1e60 r6:85a36500 r5:85ad5400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea751fb0 to 0xea751ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:84dd15c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task syz.1.210:4504 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:syz.1.210 state:D stack:0 pid:4504 tgid:4503 ppid:3100 task_flags:0x400140 flags:0x00000001 Call trace: [<81a643fc>] (__schedule) from [<81a65390>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a643fc>] (__schedule) from [<81a65390>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ea979a2c r9:00000002 r8:60000013 r7:829171a0 r6:ea979a34 r5:854bb000 r4:854bb000 [<81a65364>] (schedule) from [<81a65778>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:854bb000 r4:8291719c [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67fd8>] (__mutex_lock.constprop.0) from [<81a68ad0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:826c0b50 r8:00000001 r7:8280c9b4 r6:fffffffe r5:ea979aa0 r4:20001000 [<81a68abc>] (__mutex_lock_slowpath) from [<81a68b10>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68ad4>] (mutex_lock) from [<804ea588>] (reclaim_and_purge_vmap_areas+0x3c/0x19c mm/vmalloc.c:2387) [<804ea54c>] (reclaim_and_purge_vmap_areas) from [<804eafbc>] (alloc_vmap_area+0x8d4/0xd7c mm/vmalloc.c:2108) r10:00000000 r9:df800000 r8:00000001 r7:8280c9b4 r6:fffffffe r5:83c526b8 r4:20001000 [<804ea6e8>] (alloc_vmap_area) from [<804edacc>] (__get_vm_area_node+0xcc/0x120 mm/vmalloc.c:3193) r10:84dd1bc0 r9:00000dc0 r8:ffffffff r7:1ffffff8 r6:00000422 r5:00000001 r4:20001000 [<804eda00>] (__get_vm_area_node) from [<804ee27c>] (__vmalloc_node_range_noprof+0x8c/0x544 mm/vmalloc.c:3857) r10:00000000 r9:ffffffff r8:8226e4b8 r7:00000dc0 r6:df800000 r5:ff800000 r4:1ffffff8 [<804ee1f0>] (__vmalloc_node_range_noprof) from [<80510e6c>] (__kvmalloc_node_noprof+0x2b0/0x708 mm/slub.c:7134) r10:ea979d50 r9:000029c0 r8:854bb000 r7:00000000 r6:00000dc0 r5:00000000 r4:1ffffff8 [<80510bbc>] (__kvmalloc_node_noprof) from [<817286b0>] (kvmalloc_array_node_noprof include/linux/slab.h:1122 [inline]) [<80510bbc>] (__kvmalloc_node_noprof) from [<817286b0>] (xt_alloc_entry_offsets+0x28/0x34 net/netfilter/x_tables.c:968) r10:ea979d50 r9:84bc2800 r8:00000000 r7:00000000 r6:000004e0 r5:84bc2840 r4:07fffffe [<81728688>] (xt_alloc_entry_offsets) from [<818b5d78>] (translate_table+0x70/0x78c net/ipv4/netfilter/ip_tables.c:678) [<818b5d08>] (translate_table) from [<818b6f54>] (do_replace+0xe8/0x5d0 net/ipv4/netfilter/ip_tables.c:1137) r10:b5403587 r9:84bc2840 r8:00000000 r7:20000620 r6:000004e0 r5:84bc2800 r4:85518000 [<818b6e6c>] (do_replace) from [<818b7570>] (do_ip6t_set_ctl+0x134/0x2a0 net/ipv6/netfilter/ip6_tables.c:1644) r10:00000126 r9:854bb000 r8:00000540 r7:837a8000 r6:ea979df8 r5:842a0000 r4:00000040 [<818b743c>] (do_ip6t_set_ctl) from [<816b2690>] (nf_setsockopt+0x60/0x7c net/netfilter/nf_sockopt.c:101) r10:00000126 r9:854bb000 r8:00000540 r7:837a8000 r6:842a0000 r5:818b743c r4:829f26b8 [<816b2634>] (nf_setsockopt) from [<8186d5c8>] (ipv6_setsockopt+0x9c/0xbc net/ipv6/ipv6_sockglue.c:978) r6:00000540 r5:842a0000 r4:00000040 [<8186d530>] (ipv6_setsockopt) from [<818733cc>] (udpv6_setsockopt+0x38/0x64 net/ipv6/udp.c:1844) r6:00000040 r5:00000029 r4:81873394 [<81873398>] (udpv6_setsockopt) from [<8155aa9c>] (sock_common_setsockopt+0x38/0x40 net/core/sock.c:3912) r4:81873394 [<8155aa68>] (sock_common_setsockopt) from [<81556228>] (do_sock_setsockopt+0x70/0xc8 net/socket.c:2360) r4:8155aa64 [<815561b8>] (do_sock_setsockopt) from [<81559730>] (__sys_setsockopt+0x7c/0xc4 net/socket.c:2385) r8:00000000 r7:84e3ecc0 r6:84e3ecc1 r5:00000040 r4:00000029 [<815596b4>] (__sys_setsockopt) from [<81559794>] (__do_sys_setsockopt net/socket.c:2391 [inline]) [<815596b4>] (__sys_setsockopt) from [<81559794>] (sys_setsockopt+0x1c/0x24 net/socket.c:2388) r8:8020029c r7:00000126 r6:00316310 r5:00000000 r4:00000540 [<81559778>] (sys_setsockopt) from [<80200060>] (ret_fast_syscall+0x0/0x1c arch/arm/mm/proc-v7.S:67) Exception stack(0xea979fa8 to 0xea979ff0) 9fa0: 00000540 00000000 00000006 00000029 00000040 200005c0 9fc0: 00000540 00000000 00316310 00000126 00300000 00000000 00006364 76fa80bc 9fe0: 76fa7ec0 76fa7eb0 00019294 00132970 INFO: task syz.1.210:4504 is blocked on a mutex likely owned by task kworker/0:83:4439. task:kworker/0:83 state:R running task stack:0 pid:4439 tgid:4439 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643fc>] (__schedule) from [<81a657c4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:85ad5400 r8:80200c04 r7:ea751d54 r6:ffffffff r5:85ad5400 r4:00000000 [<81a65784>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea751d20 to 0xea751d68) 1d20: d0554000 ecbdc000 00000001 80239bf8 7f00b000 00000001 82acb1c4 82aca5a0 1d40: 7f00b000 ecbdc000 8280c9b4 ea751d9c ea751da0 ea751d70 80230af0 80239c10 1d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea751dc0 r5:ea751e08 r4:ea751dc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dd1480 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:85ad5400 r7:00000000 r6:83018400 r5:00001000 r4:7f041000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfba3000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85800b8c r4:85a36480 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:85800b8c r4:85a36480 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85ad5400 r8:85a364ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:85a36480 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85a36480 r8:80278fec r7:df9e1e60 r6:85a36500 r5:85ad5400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea751fb0 to 0xea751ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:84dd15c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:95:4508 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:95 state:D stack:0 pid:4508 tgid:4508 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643fc>] (__schedule) from [<81a65390>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a643fc>] (__schedule) from [<81a65390>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:e41c9d84 r9:00000002 r8:60000113 r7:829171a0 r6:e41c9d8c r5:84ba1800 r4:84ba1800 [<81a65364>] (schedule) from [<81a65778>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:84ba1800 r4:8291719c [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67fd8>] (__mutex_lock.constprop.0) from [<81a68ad0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e41c9e08 r4:00000000 [<81a68abc>] (__mutex_lock_slowpath) from [<81a68b10>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68ad4>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858da340 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:84ba1800 r7:00000000 r6:83018400 r5:00001000 r4:7f00d000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:e41ed000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85ab178c r4:84701700 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:85ab178c r4:84701700 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84ba1800 r8:8470172c r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:84701700 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84701700 r8:80278fec r7:ea8b9e60 r6:85b7a800 r5:84ba1800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe41c9fb0 to 0xe41c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:849c5e00 INFO: task kworker/0:95:4508 is blocked on a mutex likely owned by task kworker/0:83:4439. task:kworker/0:83 state:R running task stack:0 pid:4439 tgid:4439 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643fc>] (__schedule) from [<81a657c4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:85ad5400 r8:80200c04 r7:ea751d54 r6:ffffffff r5:85ad5400 r4:00000000 [<81a65784>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea751d20 to 0xea751d68) 1d20: d0b70000 ecbdc000 00000001 80239bf8 7f00b000 00000001 82acb1c4 82aca5a0 1d40: 7f00b000 ecbdc000 8280c9b4 ea751d9c ea751da0 ea751d70 80230af0 80239c10 1d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea751dc0 r5:ea751e08 r4:ea751dc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dd1480 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:85ad5400 r7:00000000 r6:83018400 r5:00001000 r4:7f041000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfba3000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85800b8c r4:85a36480 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:85800b8c r4:85a36480 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85ad5400 r8:85a364ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:85a36480 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85a36480 r8:80278fec r7:df9e1e60 r6:85a36500 r5:85ad5400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea751fb0 to 0xea751ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:84dd15c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:86:4554 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:86 state:D stack:0 pid:4554 tgid:4554 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643fc>] (__schedule) from [<81a65390>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a643fc>] (__schedule) from [<81a65390>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ea361d84 r9:00000002 r8:60000013 r7:829171a0 r6:ea361d8c r5:84ba0000 r4:84ba0000 [<81a65364>] (schedule) from [<81a65778>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:84ba0000 r4:8291719c [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67fd8>] (__mutex_lock.constprop.0) from [<81a68ad0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea361e08 r4:00000000 [<81a68abc>] (__mutex_lock_slowpath) from [<81a68b10>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68ad4>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84795180 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84ba0000 r7:00000000 r6:83018600 r5:00001000 r4:7f02d000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea429000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85bceb8c r4:859b3800 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:85bceb8c r4:859b3800 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84ba0000 r8:859b382c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:859b3800 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:859b3800 r8:80278fec r7:eaad9e60 r6:859b3780 r5:84ba0000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea361fb0 to 0xea361ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:847953c0 INFO: task kworker/1:86:4554 is blocked on a mutex likely owned by task kworker/0:83:4439. task:kworker/0:83 state:R running task stack:0 pid:4439 tgid:4439 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643fc>] (__schedule) from [<81a657c4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:85ad5400 r8:80200c04 r7:ea751d54 r6:ffffffff r5:85ad5400 r4:00000000 [<81a65784>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea751d20 to 0xea751d68) 1d20: d0b70000 ecbdc000 00000001 80239bf8 7f00b000 00000001 82acb1c4 82aca5a0 1d40: 7f00b000 ecbdc000 8280c9b4 ea751d9c ea751da0 ea751d70 80230af0 80239c10 1d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea751dc0 r5:ea751e08 r4:ea751dc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dd1480 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:85ad5400 r7:00000000 r6:83018400 r5:00001000 r4:7f041000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfba3000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85800b8c r4:85a36480 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:85800b8c r4:85a36480 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85ad5400 r8:85a364ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:85a36480 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85a36480 r8:80278fec r7:df9e1e60 r6:85a36500 r5:85ad5400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea751fb0 to 0xea751ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:84dd15c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 30 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT Hardware name: ARM-Versatile Express Call trace: [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c arch/arm/kernel/traps.c:257) r7:00000000 r6:00000113 r5:60000193 r4:82252738 [<80201b08>] (show_stack) from [<8021f8f8>] (__dump_stack lib/dump_stack.c:94 [inline]) [<80201b08>] (show_stack) from [<8021f8f8>] (dump_stack_lvl+0x70/0x7c lib/dump_stack.c:120) [<8021f888>] (dump_stack_lvl) from [<8021f91c>] (dump_stack+0x18/0x1c lib/dump_stack.c:129) r5:00000000 r4:00000001 [<8021f904>] (dump_stack) from [<81a4e014>] (nmi_cpu_backtrace+0x160/0x17c lib/nmi_backtrace.c:113) [<81a4deb4>] (nmi_cpu_backtrace) from [<81a4e160>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8 lib/nmi_backtrace.c:62) r7:00000000 r6:8280c690 r5:8281ae34 r4:ffffffff [<81a4e030>] (nmi_trigger_cpumask_backtrace) from [<802304fc>] (arch_trigger_cpumask_backtrace+0x18/0x1c arch/arm/kernel/smp.c:852) r9:8281ba28 r8:8280c810 r7:00007552 r6:00007dc3 r5:82abf7d4 r4:88bbb50c [<802304e4>] (arch_trigger_cpumask_backtrace) from [<8037faf0>] (trigger_all_cpu_backtrace include/linux/nmi.h:160 [inline]) [<802304e4>] (arch_trigger_cpumask_backtrace) from [<8037faf0>] (check_hung_uninterruptible_tasks kernel/hung_task.c:332 [inline]) [<802304e4>] (arch_trigger_cpumask_backtrace) from [<8037faf0>] (watchdog+0x5d0/0x850 kernel/hung_task.c:495) [<8037f520>] (watchdog) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:00000000 r8:8037f520 r7:832a1d00 r6:832a1d00 r5:832e9800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf8d9fb0 to 0xdf8d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:83337fc0 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 2821 Comm: pr/ttyAMA-1 Not tainted syzkaller #0 PREEMPT Hardware name: ARM-Versatile Express PC is at __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:152 [inline] PC is at _raw_spin_unlock_irqrestore+0x28/0x54 kernel/locking/spinlock.c:194 LR is at spin_unlock_irqrestore include/linux/spinlock.h:406 [inline] LR is at __uart_port_unlock_irqrestore include/linux/serial_core.h:616 [inline] LR is at pl011_console_device_unlock+0x20/0x24 drivers/tty/serial/amba-pl011.c:2603 pc : [<81a6e264>] lr : [<80a8f568>] psr: 60000113 sp : ead9deb0 ip : ead9dec0 fp : ead9debc r10: 82959594 r9 : 00000001 r8 : 00000000 r7 : 00000117 r6 : 829594f8 r5 : 00000000 r4 : 00000001 r3 : 00001119 r2 : 00000000 r1 : 60000113 r0 : 8427e440 Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none Control: 30c5387d Table: 888e5740 DAC: 00000000 Call trace: [<81a6e23c>] (_raw_spin_unlock_irqrestore) from [<80a8f568>] (spin_unlock_irqrestore include/linux/spinlock.h:406 [inline]) [<81a6e23c>] (_raw_spin_unlock_irqrestore) from [<80a8f568>] (__uart_port_unlock_irqrestore include/linux/serial_core.h:616 [inline]) [<81a6e23c>] (_raw_spin_unlock_irqrestore) from [<80a8f568>] (pl011_console_device_unlock+0x20/0x24 drivers/tty/serial/amba-pl011.c:2603) [<80a8f548>] (pl011_console_device_unlock) from [<802e3750>] (nbcon_emit_one+0x88/0x100 kernel/printk/nbcon.c:1142) [<802e36c8>] (nbcon_emit_one) from [<802e3970>] (nbcon_kthread_func+0x1a8/0x2a4 kernel/printk/nbcon.c:1229) r6:8280c690 r5:8384e000 r4:829594f8 [<802e37c8>] (nbcon_kthread_func) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:829594f8 r8:802e37c8 r7:84a8ff00 r6:84a8ff00 r5:8384e000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead9dfb0 to 0xead9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:838aa8c0