INFO: task kworker/1:16:4924 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:16 state:D stack:0 pid:4924 tgid:4924 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643dc>] (__schedule) from [<81a65370>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a643dc>] (__schedule) from [<81a65370>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ea319d84 r9:00000002 r8:60000013 r7:829171a0 r6:ea319d8c r5:8422ec00 r4:8422ec00 [<81a65344>] (schedule) from [<81a65758>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:8422ec00 r4:8291719c [<81a65740>] (schedule_preempt_disabled) from [<81a68308>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65740>] (schedule_preempt_disabled) from [<81a68308>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67fb8>] (__mutex_lock.constprop.0) from [<81a68ab0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea319e08 r4:00000000 [<81a68a9c>] (__mutex_lock_slowpath) from [<81a68af0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68ab4>] (mutex_lock) from [<804ea30c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86225600 r4:00000000 [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:8422ec00 r7:00000000 r6:83018600 r5:00001000 r4:7f232000 [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfbfb000 [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:863bff8c r4:84a16980 [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:863bff8c r4:84a16980 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:8422ec00 r8:84a169ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:84a16980 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84a16980 r8:80278fec r7:e018de60 r6:8549c500 r5:8422ec00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea319fb0 to 0xea319ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85571f80 INFO: task kworker/1:16:4924 is blocked on a mutex likely owned by task kworker/1:136:7726. task:kworker/1:136 state:R running task stack:0 pid:7726 tgid:7726 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643dc>] (__schedule) from [<81a657a4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:864e5400 r8:80200c04 r7:ea7b1d54 r6:ffffffff r5:864e5400 r4:00000000 [<81a65764>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea7b1d20 to 0xea7b1d68) 1d20: a0a7e000 ebf29000 00000001 80239bf8 7f22e000 00000001 82acb1c4 82aca5a0 1d40: 7f22e000 ebf29000 8280c9b4 ea7b1d9c ea7b1da0 ea7b1d70 80230af0 80239c10 1d60: 80010013 ffffffff r5:80010013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0d0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e4c>] (__purge_vmap_area_lazy) from [<804ea488>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea7b1dc0 r5:ea7b1e08 r4:ea7b1dc0 [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86481b40 r4:00000000 [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:864e5400 r7:00000000 r6:83018600 r5:00001000 r4:7f258000 [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea8cd000 [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:862c138c r4:86477680 [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:862c138c r4:86477680 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:864e5400 r8:864776ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:86477680 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:86477680 r8:80278fec r7:eb805e60 r6:86477d00 r5:864e5400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea7b1fb0 to 0xea7b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:86478700 INFO: task kworker/1:139:7775 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:139 state:D stack:0 pid:7775 tgid:7775 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643dc>] (__schedule) from [<81a65370>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a643dc>] (__schedule) from [<81a65370>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:e421dd84 r9:00000002 r8:60000113 r7:829171a0 r6:e421dd8c r5:85434800 r4:85434800 [<81a65344>] (schedule) from [<81a65758>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:85434800 r4:8291719c [<81a65740>] (schedule_preempt_disabled) from [<81a68308>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65740>] (schedule_preempt_disabled) from [<81a68308>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67fb8>] (__mutex_lock.constprop.0) from [<81a68ab0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e421de08 r4:00000000 [<81a68a9c>] (__mutex_lock_slowpath) from [<81a68af0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68ab4>] (mutex_lock) from [<804ea30c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ca7880 r4:00000000 [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:85434800 r7:00000000 r6:83018600 r5:00001000 r4:7f25e000 [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:eaa0b000 [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:8633e38c r4:8649a300 [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:8633e38c r4:8649a300 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85434800 r8:8649a32c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:8649a300 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8649a300 r8:80278fec r7:ea4ade60 r6:8647fa80 r5:85434800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe421dfb0 to 0xe421dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:8607c100 INFO: task kworker/1:139:7775 is blocked on a mutex likely owned by task kworker/1:136:7726. task:kworker/1:136 state:R running task stack:0 pid:7726 tgid:7726 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643dc>] (__schedule) from [<81a657a4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:864e5400 r8:80200c04 r7:ea7b1d54 r6:ffffffff r5:864e5400 r4:00000000 [<81a65764>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea7b1d20 to 0xea7b1d68) 1d20: a0df2000 ebf29000 00000001 80239bf8 7f22e000 00000001 82acb1c4 82aca5a0 1d40: 7f22e000 ebf29000 8280c9b4 ea7b1d9c ea7b1da0 ea7b1d70 80230af0 80239c10 1d60: 80010013 ffffffff r5:80010013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0d0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e4c>] (__purge_vmap_area_lazy) from [<804ea488>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea7b1dc0 r5:ea7b1e08 r4:ea7b1dc0 [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86481b40 r4:00000000 [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:864e5400 r7:00000000 r6:83018600 r5:00001000 r4:7f258000 [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea8cd000 [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:862c138c r4:86477680 [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:862c138c r4:86477680 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:864e5400 r8:864776ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:86477680 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:86477680 r8:80278fec r7:eb805e60 r6:86477d00 r5:864e5400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea7b1fb0 to 0xea7b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:86478700 INFO: task kworker/0:171:7807 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:171 state:D stack:0 pid:7807 tgid:7807 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643dc>] (__schedule) from [<81a65370>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a643dc>] (__schedule) from [<81a65370>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ea351d84 r9:00000002 r8:60000113 r7:829171a0 r6:ea351d8c r5:86836c00 r4:86836c00 [<81a65344>] (schedule) from [<81a65758>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:86836c00 r4:8291719c [<81a65740>] (schedule_preempt_disabled) from [<81a68308>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65740>] (schedule_preempt_disabled) from [<81a68308>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67fb8>] (__mutex_lock.constprop.0) from [<81a68ab0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea351e08 r4:00000000 [<81a68a9c>] (__mutex_lock_slowpath) from [<81a68af0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68ab4>] (mutex_lock) from [<804ea30c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86225300 r4:00000000 [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:86836c00 r7:00000000 r6:83018400 r5:00001000 r4:7f24c000 [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:e00cd000 [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:863bdb8c r4:86477480 [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:863bdb8c r4:86477480 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:86836c00 r8:864774ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:86477480 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:86477480 r8:80278fec r7:eaeb5e60 r6:86477700 r5:86836c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea351fb0 to 0xea351ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85c7e780 INFO: task kworker/0:171:7807 is blocked on a mutex likely owned by task kworker/1:136:7726. task:kworker/1:136 state:R running task stack:0 pid:7726 tgid:7726 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643dc>] (__schedule) from [<81a657a4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:864e5400 r8:80200c04 r7:ea7b1d54 r6:ffffffff r5:864e5400 r4:00000000 [<81a65764>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea7b1d20 to 0xea7b1d68) 1d20: a1033000 ebf29000 00000001 80239bf8 7f22e000 00000001 82acb1c4 82aca5a0 1d40: 7f22e000 ebf29000 8280c9b4 ea7b1d9c ea7b1da0 ea7b1d70 80230af0 80239c10 1d60: 80010013 ffffffff r5:80010013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0d0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e4c>] (__purge_vmap_area_lazy) from [<804ea488>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea7b1dc0 r5:ea7b1e08 r4:ea7b1dc0 [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86481b40 r4:00000000 [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:864e5400 r7:00000000 r6:83018600 r5:00001000 r4:7f258000 [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea8cd000 [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:862c138c r4:86477680 [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:862c138c r4:86477680 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:864e5400 r8:864776ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:86477680 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:86477680 r8:80278fec r7:eb805e60 r6:86477d00 r5:864e5400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea7b1fb0 to 0xea7b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:86478700 INFO: task kworker/0:173:7819 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:173 state:D stack:0 pid:7819 tgid:7819 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643dc>] (__schedule) from [<81a65370>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a643dc>] (__schedule) from [<81a65370>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ea989d84 r9:00000002 r8:60000113 r7:829171a0 r6:ea989d8c r5:85ec3c00 r4:85ec3c00 [<81a65344>] (schedule) from [<81a65758>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:85ec3c00 r4:8291719c [<81a65740>] (schedule_preempt_disabled) from [<81a68308>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65740>] (schedule_preempt_disabled) from [<81a68308>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67fb8>] (__mutex_lock.constprop.0) from [<81a68ab0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea989e08 r4:00000000 [<81a68a9c>] (__mutex_lock_slowpath) from [<81a68af0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68ab4>] (mutex_lock) from [<804ea30c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86225480 r4:00000000 [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:85ec3c00 r7:00000000 r6:83018400 r5:00001000 r4:7f22c000 [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfb73000 [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:863bf78c r4:86246a80 [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:863bf78c r4:86246a80 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85ec3c00 r8:86246aac r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:86246a80 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:86246a80 r8:80278fec r7:ea351e60 r6:86246b00 r5:85ec3c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea989fb0 to 0xea989ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:8617f6c0 INFO: task kworker/0:173:7819 is blocked on a mutex likely owned by task kworker/1:136:7726. task:kworker/1:136 state:R running task stack:0 pid:7726 tgid:7726 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643dc>] (__schedule) from [<81a657a4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:864e5400 r8:80200c04 r7:ea7b1d54 r6:ffffffff r5:864e5400 r4:00000000 [<81a65764>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea7b1d20 to 0xea7b1d68) 1d20: a1033000 ebf29000 00000001 80239bf8 7f22e000 00000001 82acb1c4 82aca5a0 1d40: 7f22e000 ebf29000 8280c9b4 ea7b1d9c ea7b1da0 ea7b1d70 80230af0 80239c10 1d60: 80010013 ffffffff r5:80010013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0d0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e4c>] (__purge_vmap_area_lazy) from [<804ea488>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea7b1dc0 r5:ea7b1e08 r4:ea7b1dc0 [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86481b40 r4:00000000 [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:864e5400 r7:00000000 r6:83018600 r5:00001000 r4:7f258000 [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea8cd000 [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:862c138c r4:86477680 [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:862c138c r4:86477680 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:864e5400 r8:864776ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:86477680 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:86477680 r8:80278fec r7:eb805e60 r6:86477d00 r5:864e5400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea7b1fb0 to 0xea7b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:86478700 INFO: task kworker/0:174:7837 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:174 state:D stack:0 pid:7837 tgid:7837 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643dc>] (__schedule) from [<81a65370>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a643dc>] (__schedule) from [<81a65370>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ea999d84 r9:00000002 r8:60000013 r7:829171a0 r6:ea999d8c r5:85622400 r4:85622400 [<81a65344>] (schedule) from [<81a65758>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:85622400 r4:8291719c [<81a65740>] (schedule_preempt_disabled) from [<81a68308>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65740>] (schedule_preempt_disabled) from [<81a68308>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67fb8>] (__mutex_lock.constprop.0) from [<81a68ab0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea999e08 r4:00000000 [<81a68a9c>] (__mutex_lock_slowpath) from [<81a68af0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68ab4>] (mutex_lock) from [<804ea30c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86225dc0 r4:00000000 [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:85622400 r7:00000000 r6:83018400 r5:00001000 r4:7f234000 [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfc7f000 [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:863bef8c r4:8647fc80 [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:863bef8c r4:8647fc80 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85622400 r8:8647fcac r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:8647fc80 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8647fc80 r8:80278fec r7:ea351e60 r6:8647fc00 r5:85622400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea999fb0 to 0xea999ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:862250c0 INFO: task kworker/0:174:7837 is blocked on a mutex likely owned by task kworker/1:136:7726. task:kworker/1:136 state:R running task stack:0 pid:7726 tgid:7726 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643dc>] (__schedule) from [<81a657a4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:864e5400 r8:80200c04 r7:ea7b1d54 r6:ffffffff r5:864e5400 r4:00000000 [<81a65764>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea7b1d20 to 0xea7b1d68) 1d20: a191a000 ebf29000 00000001 80239bf8 7f22e000 00000001 82acb1c4 82aca5a0 1d40: 7f22e000 ebf29000 8280c9b4 ea7b1d9c ea7b1da0 ea7b1d70 80230af0 80239c10 1d60: 80010013 ffffffff r5:80010013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0d0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e4c>] (__purge_vmap_area_lazy) from [<804ea488>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea7b1dc0 r5:ea7b1e08 r4:ea7b1dc0 [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86481b40 r4:00000000 [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:864e5400 r7:00000000 r6:83018600 r5:00001000 r4:7f258000 [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea8cd000 [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:862c138c r4:86477680 [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:862c138c r4:86477680 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:864e5400 r8:864776ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:86477680 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:86477680 r8:80278fec r7:eb805e60 r6:86477d00 r5:864e5400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea7b1fb0 to 0xea7b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:86478700 INFO: task kworker/1:141:7842 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:141 state:D stack:0 pid:7842 tgid:7842 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643dc>] (__schedule) from [<81a65370>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a643dc>] (__schedule) from [<81a65370>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ea8f1d84 r9:00000002 r8:60000113 r7:829171a0 r6:ea8f1d8c r5:864e2400 r4:864e2400 [<81a65344>] (schedule) from [<81a65758>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:864e2400 r4:8291719c [<81a65740>] (schedule_preempt_disabled) from [<81a68308>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65740>] (schedule_preempt_disabled) from [<81a68308>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67fb8>] (__mutex_lock.constprop.0) from [<81a68ab0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8f1e08 r4:00000000 [<81a68a9c>] (__mutex_lock_slowpath) from [<81a68af0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68ab4>] (mutex_lock) from [<804ea30c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8618fc00 r4:00000000 [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:864e2400 r7:00000000 r6:83018600 r5:00001000 r4:7f260000 [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:eaa33000 [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:862c378c r4:85cde000 [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:862c378c r4:85cde000 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:864e2400 r8:85cde02c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85cde000 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85cde000 r8:80278fec r7:ea4f9e60 r6:85cdee80 r5:864e2400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea8f1fb0 to 0xea8f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85ca7b00 INFO: task kworker/1:141:7842 is blocked on a mutex likely owned by task kworker/1:136:7726. task:kworker/1:136 state:R running task stack:0 pid:7726 tgid:7726 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643dc>] (__schedule) from [<81a657a4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:864e5400 r8:80200c04 r7:ea7b1d54 r6:ffffffff r5:864e5400 r4:00000000 [<81a65764>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea7b1d20 to 0xea7b1d68) 1d20: a191a000 ebf29000 00000001 80239bf8 7f22e000 00000001 82acb1c4 82aca5a0 1d40: 7f22e000 ebf29000 8280c9b4 ea7b1d9c ea7b1da0 ea7b1d70 80230af0 80239c10 1d60: 80010013 ffffffff r5:80010013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0d0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e4c>] (__purge_vmap_area_lazy) from [<804ea488>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea7b1dc0 r5:ea7b1e08 r4:ea7b1dc0 [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86481b40 r4:00000000 [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:864e5400 r7:00000000 r6:83018600 r5:00001000 r4:7f258000 [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea8cd000 [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:862c138c r4:86477680 [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:862c138c r4:86477680 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:864e5400 r8:864776ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:86477680 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:86477680 r8:80278fec r7:eb805e60 r6:86477d00 r5:864e5400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea7b1fb0 to 0xea7b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:86478700 INFO: task kworker/1:142:7848 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:142 state:D stack:0 pid:7848 tgid:7848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643dc>] (__schedule) from [<81a65370>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a643dc>] (__schedule) from [<81a65370>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:eaa79d84 r9:00000002 r8:60000113 r7:829171a0 r6:eaa79d8c r5:864e6000 r4:864e6000 [<81a65344>] (schedule) from [<81a65758>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:864e6000 r4:8291719c [<81a65740>] (schedule_preempt_disabled) from [<81a68308>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65740>] (schedule_preempt_disabled) from [<81a68308>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67fb8>] (__mutex_lock.constprop.0) from [<81a68ab0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa79e08 r4:00000000 [<81a68a9c>] (__mutex_lock_slowpath) from [<81a68af0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68ab4>] (mutex_lock) from [<804ea30c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86498e80 r4:00000000 [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:864e6000 r7:00000000 r6:83018600 r5:00001000 r4:7f270000 [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:eabca000 [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:8635bf8c r4:85cde800 [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:8635bf8c r4:85cde800 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:864e6000 r8:85cde82c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85cde800 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85cde800 r8:80278fec r7:ea4f9e60 r6:85cdec80 r5:864e6000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa79fb0 to 0xeaa79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:86498a00 INFO: task kworker/1:142:7848 is blocked on a mutex likely owned by task kworker/1:136:7726. task:kworker/1:136 state:R running task stack:0 pid:7726 tgid:7726 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643dc>] (__schedule) from [<81a657a4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:864e5400 r8:80200c04 r7:ea7b1d54 r6:ffffffff r5:864e5400 r4:00000000 [<81a65764>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea7b1d20 to 0xea7b1d68) 1d20: a193a000 ebf29000 00000001 80239bf8 7f22e000 00000001 82acb1c4 82aca5a0 1d40: 7f22e000 ebf29000 8280c9b4 ea7b1d9c ea7b1da0 ea7b1d70 80230af0 80239c10 1d60: 80010013 ffffffff r5:80010013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0d0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e4c>] (__purge_vmap_area_lazy) from [<804ea488>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea7b1dc0 r5:ea7b1e08 r4:ea7b1dc0 [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86481b40 r4:00000000 [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:864e5400 r7:00000000 r6:83018600 r5:00001000 r4:7f258000 [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea8cd000 [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:862c138c r4:86477680 [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:862c138c r4:86477680 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:864e5400 r8:864776ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:86477680 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:86477680 r8:80278fec r7:eb805e60 r6:86477d00 r5:864e5400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea7b1fb0 to 0xea7b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:86478700 INFO: task kworker/0:175:7855 blocked for more than 431 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:175 state:D stack:0 pid:7855 tgid:7855 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643dc>] (__schedule) from [<81a65370>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a643dc>] (__schedule) from [<81a65370>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ea8d5d84 r9:00000002 r8:60000113 r7:829171a0 r6:ea8d5d8c r5:84fdec00 r4:84fdec00 [<81a65344>] (schedule) from [<81a65758>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:84fdec00 r4:8291719c [<81a65740>] (schedule_preempt_disabled) from [<81a68308>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65740>] (schedule_preempt_disabled) from [<81a68308>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67fb8>] (__mutex_lock.constprop.0) from [<81a68ab0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8d5e08 r4:00000000 [<81a68a9c>] (__mutex_lock_slowpath) from [<81a68af0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68ab4>] (mutex_lock) from [<804ea30c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86225540 r4:00000000 [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:84fdec00 r7:00000000 r6:83018400 r5:00001000 r4:7f23c000 [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dffd5000 [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:863bc38c r4:8647f900 [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:863bc38c r4:8647f900 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84fdec00 r8:8647f92c r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:8647f900 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8647f900 r8:80278fec r7:ea351e60 r6:8647ff80 r5:84fdec00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea8d5fb0 to 0xea8d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:86225c40 INFO: task kworker/0:175:7855 is blocked on a mutex likely owned by task kworker/1:136:7726. task:kworker/1:136 state:R running task stack:0 pid:7726 tgid:7726 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<8028d908>] (preempt_count_sub) from [<81a657b0>] (preempt_schedule_irq+0x4c/0xa8 kernel/sched/core.c:7258) [<81a31094>] (call_with_stack) from [<80200bec>] (__irq_svc+0x8c/0xbc arch/arm/kernel/entry-armv.S:228) Exception stack(0xea7b1d20 to 0xea7b1d68) 1d20: a1c20000 ebf29000 00000001 80239bf8 7f22e000 00000001 82acb1c4 82aca5a0 1d40: 7f22e000 ebf29000 8280c9b4 ea7b1d9c ea7b1da0 ea7b1d70 80230af0 80239c10 1d60: 80010013 ffffffff [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0d0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e4c>] (__purge_vmap_area_lazy) from [<804ea488>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea7b1dc0 r5:ea7b1e08 r4:ea7b1dc0 [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86481b40 r4:00000000 [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:864e5400 r7:00000000 r6:83018600 r5:00001000 r4:7f258000 [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea8cd000 [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:862c138c r4:86477680 [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:862c138c r4:86477680 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:864e5400 r8:864776ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:86477680 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:86477680 r8:80278fec r7:eb805e60 r6:86477d00 r5:864e5400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea7b1fb0 to 0xea7b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:86478700 INFO: task kworker/0:176:7862 blocked for more than 431 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:176 state:D stack:0 pid:7862 tgid:7862 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643dc>] (__schedule) from [<81a65370>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a643dc>] (__schedule) from [<81a65370>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:eaa99d84 r9:00000002 r8:60010113 r7:829171a0 r6:eaa99d8c r5:865cb000 r4:865cb000 [<81a65344>] (schedule) from [<81a65758>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:865cb000 r4:8291719c [<81a65740>] (schedule_preempt_disabled) from [<81a68308>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65740>] (schedule_preempt_disabled) from [<81a68308>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67fb8>] (__mutex_lock.constprop.0) from [<81a68ab0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa99e08 r4:00000000 [<81a68a9c>] (__mutex_lock_slowpath) from [<81a68af0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68ab4>] (mutex_lock) from [<804ea30c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8605b9c0 r4:00000000 [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:865cb000 r7:00000000 r6:83018400 r5:00001000 r4:7f262000 [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:e014d000 [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:863bcf8c r4:86203e80 [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:863bcf8c r4:86203e80 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:865cb000 r8:86203eac r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:86203e80 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:86203e80 r8:80278fec r7:ea351e60 r6:86203f80 r5:865cb000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa99fb0 to 0xeaa99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:8648d300 INFO: task kworker/0:176:7862 is blocked on a mutex likely owned by task kworker/1:136:7726. task:kworker/1:136 state:R running task stack:0 pid:7726 tgid:7726 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643dc>] (__schedule) from [<81a657a4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:864e5400 r8:80200c04 r7:ea7b1d54 r6:ffffffff r5:864e5400 r4:00000000 [<81a65764>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea7b1d20 to 0xea7b1d68) 1d20: a1f64000 ebf29000 00000001 80239bf8 7f22e000 00000001 82acb1c4 82aca5a0 1d40: 7f22e000 ebf29000 8280c9b4 ea7b1d9c ea7b1da0 ea7b1d70 80230af0 80239c10 1d60: 80010013 ffffffff r5:80010013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0d0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e4c>] (__purge_vmap_area_lazy) from [<804ea488>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea7b1dc0 r5:ea7b1e08 r4:ea7b1dc0 [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86481b40 r4:00000000 [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:864e5400 r7:00000000 r6:83018600 r5:00001000 r4:7f258000 [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea8cd000 [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:862c138c r4:86477680 [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:862c138c r4:86477680 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:864e5400 r8:864776ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:86477680 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:86477680 r8:80278fec r7:eb805e60 r6:86477d00 r5:864e5400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea7b1fb0 to 0xea7b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:86478700 INFO: task kworker/0:177:7863 blocked for more than 431 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:177 state:D stack:0 pid:7863 tgid:7863 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643dc>] (__schedule) from [<81a65370>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a643dc>] (__schedule) from [<81a65370>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:e00a5d84 r9:00000002 r8:60000113 r7:829171a0 r6:e00a5d8c r5:865c9800 r4:865c9800 [<81a65344>] (schedule) from [<81a65758>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:865c9800 r4:8291719c [<81a65740>] (schedule_preempt_disabled) from [<81a68308>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65740>] (schedule_preempt_disabled) from [<81a68308>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67fb8>] (__mutex_lock.constprop.0) from [<81a68ab0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00a5e08 r4:00000000 [<81a68a9c>] (__mutex_lock_slowpath) from [<81a68af0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68ab4>] (mutex_lock) from [<804ea30c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ca6bc0 r4:00000000 [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:865c9800 r7:00000000 r6:83018400 r5:00001000 r4:7f264000 [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea8db000 [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:863bc78c r4:86203280 [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:863bc78c r4:86203280 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:865c9800 r8:862032ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:86203280 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:86203280 r8:80278fec r7:eaa99e60 r6:86203c00 r5:865c9800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a5fb0 to 0xe00a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:86188b00 INFO: task kworker/0:177:7863 is blocked on a mutex likely owned by task kworker/1:136:7726. task:kworker/1:136 state:R running task stack:0 pid:7726 tgid:7726 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643dc>] (__schedule) from [<81a657a4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:864e5400 r8:80200c04 r7:ea7b1d54 r6:ffffffff r5:864e5400 r4:00000000 [<81a65764>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea7b1d20 to 0xea7b1d68) 1d20: a1f6f000 ebf29000 00000001 80239bf8 7f22e000 00000001 82acb1c4 82aca5a0 1d40: 7f22e000 ebf29000 8280c9b4 ea7b1d9c ea7b1da0 ea7b1d70 80230af0 80239c10 1d60: 80010013 ffffffff r5:80010013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0d0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e4c>] (__purge_vmap_area_lazy) from [<804ea488>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea7b1dc0 r5:ea7b1e08 r4:ea7b1dc0 [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86481b40 r4:00000000 [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:864e5400 r7:00000000 r6:83018600 r5:00001000 r4:7f258000 [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea8cd000 [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:862c138c r4:86477680 [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:862c138c r4:86477680 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:864e5400 r8:864776ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:86477680 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:86477680 r8:80278fec r7:eb805e60 r6:86477d00 r5:864e5400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea7b1fb0 to 0xea7b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:86478700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:143:7865 blocked for more than 431 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:143 state:D stack:0 pid:7865 tgid:7865 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643dc>] (__schedule) from [<81a65370>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a643dc>] (__schedule) from [<81a65370>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:eaaa5d84 r9:00000002 r8:60010013 r7:829171a0 r6:eaaa5d8c r5:865ce000 r4:865ce000 [<81a65344>] (schedule) from [<81a65758>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:865ce000 r4:8291719c [<81a65740>] (schedule_preempt_disabled) from [<81a68308>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65740>] (schedule_preempt_disabled) from [<81a68308>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67fb8>] (__mutex_lock.constprop.0) from [<81a68ab0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaa5e08 r4:00000000 [<81a68a9c>] (__mutex_lock_slowpath) from [<81a68af0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68ab4>] (mutex_lock) from [<804ea30c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855e0f40 r4:00000000 [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:865ce000 r7:00000000 r6:83018600 r5:00001000 r4:7f266000 [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:eaacf000 [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:862ca38c r4:861fa900 [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:862ca38c r4:861fa900 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:865ce000 r8:861fa92c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:861fa900 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:861fa900 r8:80278fec r7:eaa79e60 r6:859fe600 r5:865ce000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaaa5fb0 to 0xeaaa5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:863d8bc0 INFO: task kworker/1:143:7865 is blocked on a mutex likely owned by task kworker/1:136:7726. task:kworker/1:136 state:R running task stack:0 pid:7726 tgid:7726 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643dc>] (__schedule) from [<81a657a4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:864e5400 r8:80200c04 r7:ea7b1d54 r6:ffffffff r5:864e5400 r4:00000000 [<81a65764>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea7b1d20 to 0xea7b1d68) 1d20: a239a000 ebf29000 00000001 80239bf8 7f22e000 00000001 82acb1c4 82aca5a0 1d40: 7f22e000 ebf29000 8280c9b4 ea7b1d9c ea7b1da0 ea7b1d70 80230af0 80239c10 1d60: 80010013 ffffffff r5:80010013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0d0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e4c>] (__purge_vmap_area_lazy) from [<804ea488>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea7b1dc0 r5:ea7b1e08 r4:ea7b1dc0 [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86481b40 r4:00000000 [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:864e5400 r7:00000000 r6:83018600 r5:00001000 r4:7f258000 [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea8cd000 [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:862c138c r4:86477680 [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:862c138c r4:86477680 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:864e5400 r8:864776ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:86477680 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:86477680 r8:80278fec r7:eb805e60 r6:86477d00 r5:864e5400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea7b1fb0 to 0xea7b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:86478700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:178:7869 blocked for more than 431 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:178 state:D stack:0 pid:7869 tgid:7869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643dc>] (__schedule) from [<81a65370>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a643dc>] (__schedule) from [<81a65370>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:eaaa1d84 r9:00000002 r8:60000113 r7:829171a0 r6:eaaa1d8c r5:84fdb000 r4:84fdb000 [<81a65344>] (schedule) from [<81a65758>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:84fdb000 r4:8291719c [<81a65740>] (schedule_preempt_disabled) from [<81a68308>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65740>] (schedule_preempt_disabled) from [<81a68308>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67fb8>] (__mutex_lock.constprop.0) from [<81a68ab0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaa1e08 r4:00000000 [<81a68a9c>] (__mutex_lock_slowpath) from [<81a68af0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68ab4>] (mutex_lock) from [<804ea30c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86480700 r4:00000000 [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:84fdb000 r7:00000000 r6:83018400 r5:00001000 r4:7f268000 [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:eab00000 [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:861d5f8c r4:8647f180 [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:861d5f8c r4:8647f180 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84fdb000 r8:8647f1ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:8647f180 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8647f180 r8:80278fec r7:eaa99e60 r6:8647f780 r5:84fdb000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaaa1fb0 to 0xeaaa1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85f71440 INFO: task kworker/0:178:7869 is blocked on a mutex likely owned by task kworker/1:136:7726. task:kworker/1:136 state:R running task stack:0 pid:7726 tgid:7726 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643dc>] (__schedule) from [<81a657a4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:864e5400 r8:80200c04 r7:ea7b1d54 r6:ffffffff r5:864e5400 r4:00000000 [<81a65764>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea7b1d20 to 0xea7b1d68) 1d20: a26c7000 ebf29000 00000001 80239bf8 7f22e000 00000001 82acb1c4 82aca5a0 1d40: 7f22e000 ebf29000 8280c9b4 ea7b1d9c ea7b1da0 ea7b1d70 80230af0 80239c10 1d60: 80010013 ffffffff r5:80010013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0d0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e4c>] (__purge_vmap_area_lazy) from [<804ea488>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea7b1dc0 r5:ea7b1e08 r4:ea7b1dc0 [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86481b40 r4:00000000 [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:864e5400 r7:00000000 r6:83018600 r5:00001000 r4:7f258000 [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea8cd000 [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:862c138c r4:86477680 [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:862c138c r4:86477680 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:864e5400 r8:864776ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:86477680 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:86477680 r8:80278fec r7:eb805e60 r6:86477d00 r5:864e5400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea7b1fb0 to 0xea7b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:86478700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:179:7871 blocked for more than 431 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:179 state:D stack:0 pid:7871 tgid:7871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643dc>] (__schedule) from [<81a65370>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a643dc>] (__schedule) from [<81a65370>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:eaab1d84 r9:00000002 r8:60000113 r7:829171a0 r6:eaab1d8c r5:865cc800 r4:865cc800 [<81a65344>] (schedule) from [<81a65758>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:865cc800 r4:8291719c [<81a65740>] (schedule_preempt_disabled) from [<81a68308>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65740>] (schedule_preempt_disabled) from [<81a68308>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67fb8>] (__mutex_lock.constprop.0) from [<81a68ab0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaab1e08 r4:00000000 [<81a68a9c>] (__mutex_lock_slowpath) from [<81a68af0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68ab4>] (mutex_lock) from [<804ea30c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86226400 r4:00000000 [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:865cc800 r7:00000000 r6:83018400 r5:00001000 r4:7f26e000 [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:eab85000 [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:863bfb8c r4:8647fd80 [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:863bfb8c r4:8647fd80 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:865cc800 r8:8647fdac r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:8647fd80 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8647fd80 r8:80278fec r7:eaaa1e60 r6:8647fe00 r5:865cc800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaab1fb0 to 0xeaab1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85f71440 INFO: task kworker/0:179:7871 is blocked on a mutex likely owned by task kworker/1:136:7726. task:kworker/1:136 state:R running task stack:0 pid:7726 tgid:7726 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643dc>] (__schedule) from [<81a657a4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:864e5400 r8:80200c04 r7:ea7b1d54 r6:ffffffff r5:864e5400 r4:00000000 [<81a65764>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea7b1d20 to 0xea7b1d68) 1d20: a2d28000 ebf29000 00000001 80239bf8 7f22e000 00000001 82acb1c4 82aca5a0 1d40: 7f22e000 ebf29000 8280c9b4 ea7b1d9c ea7b1da0 ea7b1d70 80230af0 80239c10 1d60: 80010013 ffffffff r5:80010013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0d0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e4c>] (__purge_vmap_area_lazy) from [<804ea488>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea7b1dc0 r5:ea7b1e08 r4:ea7b1dc0 [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86481b40 r4:00000000 [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:864e5400 r7:00000000 r6:83018600 r5:00001000 r4:7f258000 [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea8cd000 [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:862c138c r4:86477680 [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:862c138c r4:86477680 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:864e5400 r8:864776ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:86477680 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:86477680 r8:80278fec r7:eb805e60 r6:86477d00 r5:864e5400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea7b1fb0 to 0xea7b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:86478700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:180:7878 blocked for more than 432 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:180 state:D stack:0 pid:7878 tgid:7878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643dc>] (__schedule) from [<81a65370>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a643dc>] (__schedule) from [<81a65370>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ea8d1d84 r9:00000002 r8:60000113 r7:829171a0 r6:ea8d1d8c r5:865bbc00 r4:865bbc00 [<81a65344>] (schedule) from [<81a65758>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:865bbc00 r4:8291719c [<81a65740>] (schedule_preempt_disabled) from [<81a68308>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65740>] (schedule_preempt_disabled) from [<81a68308>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67fb8>] (__mutex_lock.constprop.0) from [<81a68ab0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8d1e08 r4:00000000 [<81a68a9c>] (__mutex_lock_slowpath) from [<81a68af0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68ab4>] (mutex_lock) from [<804ea30c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ca7680 r4:00000000 [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:865bbc00 r7:00000000 r6:83018400 r5:00001000 r4:7f274000 [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:eac43000 [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:863beb8c r4:85f05a80 [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:863beb8c r4:85f05a80 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:865bbc00 r8:85f05aac r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:85f05a80 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85f05a80 r8:80278fec r7:eaab1e60 r6:85f05f80 r5:865bbc00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea8d1fb0 to 0xea8d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85f5a640 INFO: task kworker/0:180:7878 is blocked on a mutex likely owned by task kworker/1:136:7726. task:kworker/1:136 state:R running task stack:0 pid:7726 tgid:7726 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643dc>] (__schedule) from [<81a657a4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:864e5400 r8:80200c04 r7:ea7b1d54 r6:ffffffff r5:864e5400 r4:00000000 [<81a65764>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea7b1d20 to 0xea7b1d68) 1d20: a2d30000 ebf29000 00000001 80239bf8 7f22e000 00000001 82acb1c4 82aca5a0 1d40: 7f22e000 ebf29000 8280c9b4 ea7b1d9c ea7b1da0 ea7b1d70 80230af0 80239c10 1d60: 80010013 ffffffff r5:80010013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0d0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e4c>] (__purge_vmap_area_lazy) from [<804ea488>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea7b1dc0 r5:ea7b1e08 r4:ea7b1dc0 [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86481b40 r4:00000000 [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:864e5400 r7:00000000 r6:83018600 r5:00001000 r4:7f258000 [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea8cd000 [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:862c138c r4:86477680 [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:862c138c r4:86477680 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:864e5400 r8:864776ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:86477680 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:86477680 r8:80278fec r7:eb805e60 r6:86477d00 r5:864e5400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea7b1fb0 to 0xea7b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:86478700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:144:7881 blocked for more than 432 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:144 state:D stack:0 pid:7881 tgid:7881 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643dc>] (__schedule) from [<81a65370>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a643dc>] (__schedule) from [<81a65370>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:eab4dd84 r9:00000002 r8:60000113 r7:829171a0 r6:eab4dd8c r5:864e6c00 r4:864e6c00 [<81a65344>] (schedule) from [<81a65758>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:864e6c00 r4:8291719c [<81a65740>] (schedule_preempt_disabled) from [<81a68308>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65740>] (schedule_preempt_disabled) from [<81a68308>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67fb8>] (__mutex_lock.constprop.0) from [<81a68ab0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab4de08 r4:00000000 [<81a68a9c>] (__mutex_lock_slowpath) from [<81a68af0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68ab4>] (mutex_lock) from [<804ea30c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:861f57c0 r4:00000000 [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:864e6c00 r7:00000000 r6:83018600 r5:00001000 r4:7f26a000 [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:eab06000 [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:863bdf8c r4:86203980 [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:863bdf8c r4:86203980 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:864e6c00 r8:862039ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:86203980 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:86203980 r8:80278fec r7:eaa79e60 r6:86203580 r5:864e6c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab4dfb0 to 0xeab4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:859300c0 INFO: task kworker/1:144:7881 is blocked on a mutex likely owned by task kworker/1:136:7726. task:kworker/1:136 state:R running task stack:0 pid:7726 tgid:7726 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643dc>] (__schedule) from [<81a657a4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:864e5400 r8:80200c04 r7:ea7b1d54 r6:ffffffff r5:864e5400 r4:00000000 [<81a65764>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea7b1d20 to 0xea7b1d68) 1d20: a2d60000 ebf29000 00000001 80239bf8 7f22e000 00000001 82acb1c4 82aca5a0 1d40: 7f22e000 ebf29000 8280c9b4 ea7b1d9c ea7b1da0 ea7b1d70 80230af0 80239c10 1d60: 80010013 ffffffff r5:80010013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0d0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e4c>] (__purge_vmap_area_lazy) from [<804ea488>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea7b1dc0 r5:ea7b1e08 r4:ea7b1dc0 [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86481b40 r4:00000000 [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:864e5400 r7:00000000 r6:83018600 r5:00001000 r4:7f258000 [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea8cd000 [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:862c138c r4:86477680 [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:862c138c r4:86477680 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:864e5400 r8:864776ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:86477680 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:86477680 r8:80278fec r7:eb805e60 r6:86477d00 r5:864e5400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea7b1fb0 to 0xea7b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:86478700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:145:7883 blocked for more than 432 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:145 state:D stack:0 pid:7883 tgid:7883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643dc>] (__schedule) from [<81a65370>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a643dc>] (__schedule) from [<81a65370>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:eab51d84 r9:00000002 r8:60000113 r7:829171a0 r6:eab51d8c r5:864e0c00 r4:864e0c00 [<81a65344>] (schedule) from [<81a65758>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:864e0c00 r4:8291719c [<81a65740>] (schedule_preempt_disabled) from [<81a68308>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65740>] (schedule_preempt_disabled) from [<81a68308>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67fb8>] (__mutex_lock.constprop.0) from [<81a68ab0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab51e08 r4:00000000 [<81a68a9c>] (__mutex_lock_slowpath) from [<81a68af0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68ab4>] (mutex_lock) from [<804ea30c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86494400 r4:00000000 [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:864e0c00 r7:00000000 r6:83018600 r5:00001000 r4:7f26c000 [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:eab31000 [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:863bd38c r4:85cdec00 [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:863bd38c r4:85cdec00 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:864e0c00 r8:85cdec2c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:85cdec00 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85cdec00 r8:80278fec r7:ea4f9e60 r6:85cde500 r5:864e0c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab51fb0 to 0xeab51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85a50fc0 INFO: task kworker/1:145:7883 is blocked on a mutex likely owned by task kworker/1:136:7726. task:kworker/1:136 state:R running task stack:0 pid:7726 tgid:7726 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643dc>] (__schedule) from [<81a657a4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:864e5400 r8:80200c04 r7:ea7b1d54 r6:ffffffff r5:864e5400 r4:00000000 [<81a65764>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea7b1d20 to 0xea7b1d68) 1d20: a2dc5000 ebf29000 00000001 80239bf8 7f22e000 00000001 82acb1c4 82aca5a0 1d40: 7f22e000 ebf29000 8280c9b4 ea7b1d9c ea7b1da0 ea7b1d70 80230af0 80239c10 1d60: 80010013 ffffffff r5:80010013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0d0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e4c>] (__purge_vmap_area_lazy) from [<804ea488>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea7b1dc0 r5:ea7b1e08 r4:ea7b1dc0 [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86481b40 r4:00000000 [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:864e5400 r7:00000000 r6:83018600 r5:00001000 r4:7f258000 [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea8cd000 [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:862c138c r4:86477680 [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:862c138c r4:86477680 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:864e5400 r8:864776ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:86477680 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:86477680 r8:80278fec r7:eb805e60 r6:86477d00 r5:864e5400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea7b1fb0 to 0xea7b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:86478700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:181:7889 blocked for more than 432 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:181 state:D stack:0 pid:7889 tgid:7889 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643dc>] (__schedule) from [<81a65370>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a643dc>] (__schedule) from [<81a65370>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:eaa31d84 r9:00000002 r8:60000013 r7:829171a0 r6:eaa31d8c r5:8615d400 r4:8615d400 [<81a65344>] (schedule) from [<81a65758>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:8615d400 r4:8291719c [<81a65740>] (schedule_preempt_disabled) from [<81a68308>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65740>] (schedule_preempt_disabled) from [<81a68308>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67fb8>] (__mutex_lock.constprop.0) from [<81a68ab0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa31e08 r4:00000000 [<81a68a9c>] (__mutex_lock_slowpath) from [<81a68af0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68ab4>] (mutex_lock) from [<804ea30c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86106240 r4:00000000 [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:8615d400 r7:00000000 r6:83018400 r5:00001000 r4:7f272000 [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:eabf1000 [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:863be78c r4:85f05580 [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:863be78c r4:85f05580 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:8615d400 r8:85f055ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:85f05580 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85f05580 r8:80278fec r7:ea8d1e60 r6:85f05400 r5:8615d400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa31fb0 to 0xeaa31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:86092c40 INFO: task kworker/0:181:7889 is blocked on a mutex likely owned by task kworker/1:136:7726. task:kworker/1:136 state:R running task stack:0 pid:7726 tgid:7726 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643dc>] (__schedule) from [<81a657a4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:864e5400 r8:80200c04 r7:ea7b1d54 r6:ffffffff r5:864e5400 r4:00000000 [<81a65764>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea7b1d20 to 0xea7b1d68) 1d20: a3109000 ebf29000 00000001 80239bf8 7f22e000 00000001 82acb1c4 82aca5a0 1d40: 7f22e000 ebf29000 8280c9b4 ea7b1d9c ea7b1da0 ea7b1d70 80230af0 80239c10 1d60: 80010013 ffffffff r5:80010013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0d0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e4c>] (__purge_vmap_area_lazy) from [<804ea488>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea7b1dc0 r5:ea7b1e08 r4:ea7b1dc0 [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86481b40 r4:00000000 [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:864e5400 r7:00000000 r6:83018600 r5:00001000 r4:7f258000 [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea8cd000 [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:862c138c r4:86477680 [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:862c138c r4:86477680 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:864e5400 r8:864776ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:86477680 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:86477680 r8:80278fec r7:eb805e60 r6:86477d00 r5:864e5400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea7b1fb0 to 0xea7b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:86478700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:182:7894 blocked for more than 432 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:182 state:D stack:0 pid:7894 tgid:7894 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643dc>] (__schedule) from [<81a65370>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a643dc>] (__schedule) from [<81a65370>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:eabf5d84 r9:00000002 r8:60000113 r7:829171a0 r6:eabf5d8c r5:865cbc00 r4:865cbc00 [<81a65344>] (schedule) from [<81a65758>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:865cbc00 r4:8291719c [<81a65740>] (schedule_preempt_disabled) from [<81a68308>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65740>] (schedule_preempt_disabled) from [<81a68308>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67fb8>] (__mutex_lock.constprop.0) from [<81a68ab0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabf5e08 r4:00000000 [<81a68a9c>] (__mutex_lock_slowpath) from [<81a68af0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68ab4>] (mutex_lock) from [<804ea30c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:863d83c0 r4:00000000 [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:865cbc00 r7:00000000 r6:83018400 r5:00001000 r4:7f276000 [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:eac73000 [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:86358b8c r4:85f05680 [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:86358b8c r4:85f05680 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:865cbc00 r8:85f056ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:85f05680 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85f05680 r8:80278fec r7:ea8d1e60 r6:85f05700 r5:865cbc00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabf5fb0 to 0xeabf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:86219640 INFO: task kworker/0:182:7894 is blocked on a mutex likely owned by task kworker/1:136:7726. task:kworker/1:136 state:R running task stack:0 pid:7726 tgid:7726 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643dc>] (__schedule) from [<81a657a4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:864e5400 r8:80200c04 r7:ea7b1d54 r6:ffffffff r5:864e5400 r4:00000000 [<81a65764>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea7b1d20 to 0xea7b1d68) 1d20: a3113000 ebf29000 00000001 80239bf8 7f22e000 00000001 82acb1c4 82aca5a0 1d40: 7f22e000 ebf29000 8280c9b4 ea7b1d9c ea7b1da0 ea7b1d70 80230af0 80239c10 1d60: 80010013 ffffffff r5:80010013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0d0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e4c>] (__purge_vmap_area_lazy) from [<804ea488>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea7b1dc0 r5:ea7b1e08 r4:ea7b1dc0 [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86481b40 r4:00000000 [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:864e5400 r7:00000000 r6:83018600 r5:00001000 r4:7f258000 [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea8cd000 [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:862c138c r4:86477680 [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:862c138c r4:86477680 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:864e5400 r8:864776ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:86477680 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:86477680 r8:80278fec r7:eb805e60 r6:86477d00 r5:864e5400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea7b1fb0 to 0xea7b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:86478700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:184:7906 blocked for more than 432 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:184 state:D stack:0 pid:7906 tgid:7906 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643dc>] (__schedule) from [<81a65370>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a643dc>] (__schedule) from [<81a65370>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:eac91d84 r9:00000002 r8:60000013 r7:829171a0 r6:eac91d8c r5:86832400 r4:86832400 [<81a65344>] (schedule) from [<81a65758>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:86832400 r4:8291719c [<81a65740>] (schedule_preempt_disabled) from [<81a68308>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65740>] (schedule_preempt_disabled) from [<81a68308>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67fb8>] (__mutex_lock.constprop.0) from [<81a68ab0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac91e08 r4:00000000 [<81a68a9c>] (__mutex_lock_slowpath) from [<81a68af0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68ab4>] (mutex_lock) from [<804ea30c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f5a800 r4:00000000 [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:86832400 r7:00000000 r6:83018400 r5:00001000 r4:7f278000 [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:eacb7000 [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:863be38c r4:85f05c80 [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:863be38c r4:85f05c80 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:86832400 r8:85f05cac r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:85f05c80 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85f05c80 r8:80278fec r7:eac4de60 r6:85f05100 r5:86832400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac91fb0 to 0xeac91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:8640d440 INFO: task kworker/0:184:7906 is blocked on a mutex likely owned by task kworker/1:136:7726. task:kworker/1:136 state:R running task stack:0 pid:7726 tgid:7726 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643dc>] (__schedule) from [<81a657a4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:864e5400 r8:80200c04 r7:ea7b1d54 r6:ffffffff r5:864e5400 r4:00000000 [<81a65764>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea7b1d20 to 0xea7b1d68) 1d20: a3134000 ebf29000 00000001 80239bf8 7f22e000 00000001 82acb1c4 82aca5a0 1d40: 7f22e000 ebf29000 8280c9b4 ea7b1d9c ea7b1da0 ea7b1d70 80230af0 80239c10 1d60: 80010013 ffffffff r5:80010013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0d0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e4c>] (__purge_vmap_area_lazy) from [<804ea488>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea7b1dc0 r5:ea7b1e08 r4:ea7b1dc0 [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86481b40 r4:00000000 [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:864e5400 r7:00000000 r6:83018600 r5:00001000 r4:7f258000 [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea8cd000 [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:862c138c r4:86477680 [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:862c138c r4:86477680 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:864e5400 r8:864776ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:86477680 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:86477680 r8:80278fec r7:eb805e60 r6:86477d00 r5:864e5400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea7b1fb0 to 0xea7b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:86478700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:185:7910 blocked for more than 433 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:185 state:D stack:0 pid:7910 tgid:7910 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643dc>] (__schedule) from [<81a65370>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a643dc>] (__schedule) from [<81a65370>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:eacb5d84 r9:00000002 r8:60000113 r7:829171a0 r6:eacb5d8c r5:857c8000 r4:857c8000 [<81a65344>] (schedule) from [<81a65758>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:857c8000 r4:8291719c [<81a65740>] (schedule_preempt_disabled) from [<81a68308>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65740>] (schedule_preempt_disabled) from [<81a68308>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67fb8>] (__mutex_lock.constprop.0) from [<81a68ab0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacb5e08 r4:00000000 [<81a68a9c>] (__mutex_lock_slowpath) from [<81a68af0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68ab4>] (mutex_lock) from [<804ea30c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86494440 r4:00000000 [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:857c8000 r7:00000000 r6:83018400 r5:00001000 r4:7f27a000 [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:eacdb000 [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:862c878c r4:85f05280 [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:862c878c r4:85f05280 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:857c8000 r8:85f052ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:85f05280 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85f05280 r8:80278fec r7:eac4de60 r6:85f05900 r5:857c8000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacb5fb0 to 0xeacb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85f71340 INFO: task kworker/0:185:7910 is blocked on a mutex likely owned by task kworker/1:136:7726. task:kworker/1:136 state:R running task stack:0 pid:7726 tgid:7726 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643dc>] (__schedule) from [<81a657a4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:864e5400 r8:80200c04 r7:ea7b1d54 r6:ffffffff r5:864e5400 r4:00000000 [<81a65764>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea7b1d20 to 0xea7b1d68) 1d20: a3519000 ebf29000 00000001 80239bf8 7f22e000 00000001 82acb1c4 82aca5a0 1d40: 7f22e000 ebf29000 8280c9b4 ea7b1d9c ea7b1da0 ea7b1d70 80230af0 80239c10 1d60: 80010013 ffffffff r5:80010013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0d0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e4c>] (__purge_vmap_area_lazy) from [<804ea488>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea7b1dc0 r5:ea7b1e08 r4:ea7b1dc0 [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86481b40 r4:00000000 [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:864e5400 r7:00000000 r6:83018600 r5:00001000 r4:7f258000 [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea8cd000 [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:862c138c r4:86477680 [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:862c138c r4:86477680 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:864e5400 r8:864776ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:86477680 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:86477680 r8:80278fec r7:eb805e60 r6:86477d00 r5:864e5400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea7b1fb0 to 0xea7b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:86478700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:186:7915 blocked for more than 433 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:186 state:D stack:0 pid:7915 tgid:7915 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643dc>] (__schedule) from [<81a65370>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a643dc>] (__schedule) from [<81a65370>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ead09d84 r9:00000002 r8:60000013 r7:829171a0 r6:ead09d8c r5:857c9800 r4:857c9800 [<81a65344>] (schedule) from [<81a65758>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:857c9800 r4:8291719c [<81a65740>] (schedule_preempt_disabled) from [<81a68308>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65740>] (schedule_preempt_disabled) from [<81a68308>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67fb8>] (__mutex_lock.constprop.0) from [<81a68ab0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead09e08 r4:00000000 [<81a68a9c>] (__mutex_lock_slowpath) from [<81a68af0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68ab4>] (mutex_lock) from [<804ea30c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c7e0c0 r4:00000000 [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:857c9800 r7:00000000 r6:83018400 r5:00001000 r4:7f27e000 [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ead1f000 [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:863bd78c r4:85f05d00 [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:863bd78c r4:85f05d00 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:857c9800 r8:85f05d2c r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:85f05d00 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85f05d00 r8:80278fec r7:eac4de60 r6:85f05b80 r5:857c9800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead09fb0 to 0xead09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:86494040 INFO: task kworker/0:186:7915 is blocked on a mutex likely owned by task kworker/1:136:7726. task:kworker/1:136 state:R running task stack:0 pid:7726 tgid:7726 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643dc>] (__schedule) from [<81a657a4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:864e5400 r8:80200c04 r7:ea7b1d54 r6:ffffffff r5:864e5400 r4:00000000 [<81a65764>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea7b1d20 to 0xea7b1d68) 1d20: a3525000 ebf29000 00000001 80239bf8 7f22e000 00000001 82acb1c4 82aca5a0 1d40: 7f22e000 ebf29000 8280c9b4 ea7b1d9c ea7b1da0 ea7b1d70 80230af0 80239c10 1d60: 80010013 ffffffff r5:80010013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0d0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e4c>] (__purge_vmap_area_lazy) from [<804ea488>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea7b1dc0 r5:ea7b1e08 r4:ea7b1dc0 [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86481b40 r4:00000000 [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:864e5400 r7:00000000 r6:83018600 r5:00001000 r4:7f258000 [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea8cd000 [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:862c138c r4:86477680 [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:862c138c r4:86477680 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:864e5400 r8:864776ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:86477680 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:86477680 r8:80278fec r7:eb805e60 r6:86477d00 r5:864e5400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea7b1fb0 to 0xea7b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:86478700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:187:7917 blocked for more than 433 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:187 state:D stack:0 pid:7917 tgid:7917 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643dc>] (__schedule) from [<81a65370>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a643dc>] (__schedule) from [<81a65370>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:eacd9d84 r9:00000002 r8:60000113 r7:829171a0 r6:eacd9d8c r5:857ca400 r4:857ca400 [<81a65344>] (schedule) from [<81a65758>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:857ca400 r4:8291719c [<81a65740>] (schedule_preempt_disabled) from [<81a68308>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65740>] (schedule_preempt_disabled) from [<81a68308>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67fb8>] (__mutex_lock.constprop.0) from [<81a68ab0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacd9e08 r4:00000000 [<81a68a9c>] (__mutex_lock_slowpath) from [<81a68af0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68ab4>] (mutex_lock) from [<804ea30c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86494600 r4:00000000 [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:857ca400 r7:00000000 r6:83018400 r5:00001000 r4:7f27c000 [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:eace1000 [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:862cb38c r4:85f05200 [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:862cb38c r4:85f05200 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:857ca400 r8:85f0522c r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:85f05200 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85f05200 r8:80278fec r7:eac4de60 r6:85f05b00 r5:857ca400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacd9fb0 to 0xeacd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85c7e300 INFO: task kworker/0:187:7917 is blocked on a mutex likely owned by task kworker/1:136:7726. task:kworker/1:136 state:R running task stack:0 pid:7726 tgid:7726 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643dc>] (__schedule) from [<81a657a4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:864e5400 r8:80200c04 r7:ea7b1d54 r6:ffffffff r5:864e5400 r4:00000000 [<81a65764>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea7b1d20 to 0xea7b1d68) 1d20: a3a16000 ebf29000 00000001 80239bf8 7f22e000 00000001 82acb1c4 82aca5a0 1d40: 7f22e000 ebf29000 8280c9b4 ea7b1d9c ea7b1da0 ea7b1d70 80230af0 80239c10 1d60: 80010013 ffffffff r5:80010013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0d0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e4c>] (__purge_vmap_area_lazy) from [<804ea488>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea7b1dc0 r5:ea7b1e08 r4:ea7b1dc0 [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86481b40 r4:00000000 [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:864e5400 r7:00000000 r6:83018600 r5:00001000 r4:7f258000 [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea8cd000 [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:862c138c r4:86477680 [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:862c138c r4:86477680 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:864e5400 r8:864776ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:86477680 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:86477680 r8:80278fec r7:eb805e60 r6:86477d00 r5:864e5400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea7b1fb0 to 0xea7b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:86478700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:188:7918 blocked for more than 433 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:188 state:D stack:0 pid:7918 tgid:7918 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643dc>] (__schedule) from [<81a65370>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a643dc>] (__schedule) from [<81a65370>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ead45d84 r9:00000002 r8:60000113 r7:829171a0 r6:ead45d8c r5:857cbc00 r4:857cbc00 [<81a65344>] (schedule) from [<81a65758>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:857cbc00 r4:8291719c [<81a65740>] (schedule_preempt_disabled) from [<81a68308>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65740>] (schedule_preempt_disabled) from [<81a68308>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67fb8>] (__mutex_lock.constprop.0) from [<81a68ab0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead45e08 r4:00000000 [<81a68a9c>] (__mutex_lock_slowpath) from [<81a68af0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68ab4>] (mutex_lock) from [<804ea30c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:864815c0 r4:00000000 [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:857cbc00 r7:00000000 r6:83018400 r5:00001000 r4:7f280000 [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ead4d000 [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:863bf38c r4:85f05500 [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:863bf38c r4:85f05500 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:857cbc00 r8:85f0552c r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:85f05500 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85f05500 r8:80278fec r7:eac4de60 r6:85f05e00 r5:857cbc00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead45fb0 to 0xead45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85c7e6c0 INFO: task kworker/0:188:7918 is blocked on a mutex likely owned by task kworker/1:136:7726. task:kworker/1:136 state:R running task stack:0 pid:7726 tgid:7726 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a643dc>] (__schedule) from [<81a657a4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:864e5400 r8:80200c04 r7:ea7b1d54 r6:ffffffff r5:864e5400 r4:00000000 [<81a65764>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea7b1d20 to 0xea7b1d68) 1d20: a3a1f000 ebf29000 00000001 80239bf8 7f22e000 00000001 82acb1c4 82aca5a0 1d40: 7f22e000 ebf29000 8280c9b4 ea7b1d9c ea7b1da0 ea7b1d70 80230af0 80239c10 1d60: 80010013 ffffffff r5:80010013 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0d0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e4c>] (__purge_vmap_area_lazy) from [<804ea488>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea7b1dc0 r5:ea7b1e08 r4:ea7b1dc0 [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86481b40 r4:00000000 [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:864e5400 r7:00000000 r6:83018600 r5:00001000 r4:7f258000 [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea8cd000 [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:862c138c r4:86477680 [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:862c138c r4:86477680 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:864e5400 r8:864776ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:86477680 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:86477680 r8:80278fec r7:eb805e60 r6:86477d00 r5:864e5400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea7b1fb0 to 0xea7b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:86478700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 30 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT Hardware name: ARM-Versatile Express Call trace: [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c arch/arm/kernel/traps.c:257) r7:00000000 r6:00000013 r5:60000093 r4:82252738 [<80201b08>] (show_stack) from [<8021f8f8>] (__dump_stack lib/dump_stack.c:94 [inline]) [<80201b08>] (show_stack) from [<8021f8f8>] (dump_stack_lvl+0x70/0x7c lib/dump_stack.c:120) [<8021f888>] (dump_stack_lvl) from [<8021f91c>] (dump_stack+0x18/0x1c lib/dump_stack.c:129) r5:00000000 r4:00000001 [<8021f904>] (dump_stack) from [<81a4dff4>] (nmi_cpu_backtrace+0x160/0x17c lib/nmi_backtrace.c:113) [<81a4de94>] (nmi_cpu_backtrace) from [<81a4e140>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8 lib/nmi_backtrace.c:62) r7:00000000 r6:8280c690 r5:8281ae34 r4:ffffffff [<81a4e010>] (nmi_trigger_cpumask_backtrace) from [<802304fc>] (arch_trigger_cpumask_backtrace+0x18/0x1c arch/arm/kernel/smp.c:852) r9:8281ba28 r8:8280c810 r7:00015622 r6:00007d53 r5:82abf7d4 r4:8411390c [<802304e4>] (arch_trigger_cpumask_backtrace) from [<8037faf8>] (trigger_all_cpu_backtrace include/linux/nmi.h:160 [inline]) [<802304e4>] (arch_trigger_cpumask_backtrace) from [<8037faf8>] (check_hung_uninterruptible_tasks kernel/hung_task.c:332 [inline]) [<802304e4>] (arch_trigger_cpumask_backtrace) from [<8037faf8>] (watchdog+0x5d0/0x850 kernel/hung_task.c:495) [<8037f528>] (watchdog) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:00000000 r8:8037f528 r7:830d5900 r6:830d5900 r5:8321ec00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf8d9fb0 to 0xdf8d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:832cff00 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 3097 Comm: syz-executor Not tainted syzkaller #0 PREEMPT Hardware name: ARM-Versatile Express PC is at selinux_socket_recvmsg+0x18/0x1c security/selinux/hooks.c:5145 LR is at rcu_read_unlock include/linux/rcupdate.h:899 [inline] LR is at avc_has_perm_noaudit+0xc8/0x158 security/selinux/avc.c:1164 pc : [<807a4e78>] lr : [<8079e8e8>] psr: 60000013 sp : df965e10 ip : 00000000 fp : df965e1c r10: 00000001 r9 : 00004004 r8 : 807a4e60 r7 : 00000040 r6 : 00000004 r5 : df965e68 r4 : 837a7900 r3 : 8414bc00 r2 : 00000000 r1 : 00000000 r0 : 00000000 Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none Control: 30c5387d Table: 84d4ac80 DAC: 00000000 Call trace: [<807a4e60>] (selinux_socket_recvmsg) from [<8079771c>] (security_socket_recvmsg+0x204/0x210 security/security.c:4774) [<80797518>] (security_socket_recvmsg) from [<81556910>] (sock_recvmsg+0x24/0x78 net/socket.c:1098) r9:00004004 r8:7ecd26fc r7:00000040 r6:837a7900 r5:df965e68 r4:df965ef0 [<815568ec>] (sock_recvmsg) from [<81556a08>] (sock_read_iter+0xa4/0xfc net/socket.c:1170) r7:837a7900 r6:8485fc00 r5:df965f08 r4:df965ef0 [<81556964>] (sock_read_iter) from [<8055f888>] (new_sync_read fs/read_write.c:491 [inline]) [<81556964>] (sock_read_iter) from [<8055f888>] (vfs_read+0x2fc/0x324 fs/read_write.c:572) r7:00000000 r6:8414bc00 r5:00000004 r4:8485fc00 [<8055f58c>] (vfs_read) from [<80560388>] (ksys_read+0xc8/0xe8 fs/read_write.c:715) r10:00000003 r9:8414bc00 r8:8020029c r7:00000004 r6:7ecd26fc r5:8485fc00 r4:8485fc00 [<805602c0>] (ksys_read) from [<805603b8>] (__do_sys_read fs/read_write.c:724 [inline]) [<805602c0>] (ksys_read) from [<805603b8>] (sys_read+0x10/0x14 fs/read_write.c:722) r7:00000003 r6:00000000 r5:00000000 r4:7ecd2770 [<805603a8>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c arch/arm/mm/proc-v7.S:67) Exception stack(0xdf965fa8 to 0xdf965ff0) 5fa0: 7ecd2770 00000000 00000003 7ecd26fc 00000004 00000001 5fc0: 7ecd2770 00000000 00000000 00000003 00000004 7ecd26fc 7ecd278c 7ecd2770 5fe0: 00000158 7ecd26d8 000357a8 00130800