INFO: task kworker/1:6:4102 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:6 state:D stack:0 pid:4102 tgid:4102 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81aa9bfc>] (__schedule) from [<81aaae8c>] (__schedule_loop kernel/sched/core.c:6949 [inline]) [<81aa9bfc>] (__schedule) from [<81aaae8c>] (schedule+0x2c/0x134 kernel/sched/core.c:6964) r10:df9f5d84 r9:00000000 r8:60000113 r7:df9f5d8c r6:829172e8 r5:83e86000 r4:83e86000 [<81aaae60>] (schedule) from [<81aab018>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7021) r5:83e86000 r4:829172e4 [<81aab000>] (schedule_preempt_disabled) from [<81aae5e0>] (__mutex_lock_common kernel/locking/mutex.c:692 [inline]) [<81aab000>] (schedule_preempt_disabled) from [<81aae5e0>] (__mutex_lock.constprop.0+0x584/0xf10 kernel/locking/mutex.c:776) [<81aae05c>] (__mutex_lock.constprop.0) from [<81aaf040>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1065) r10:8280c7e4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9f5e08 r4:00000000 [<81aaf02c>] (__mutex_lock_slowpath) from [<81aaf080>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:290) [<81aaf044>] (mutex_lock) from [<804f0fe8>] (_vm_unmap_aliases+0x5c/0x238 mm/vmalloc.c:2944) [<804f0f8c>] (_vm_unmap_aliases) from [<804f4ccc>] (vm_reset_perms mm/vmalloc.c:3375 [inline]) [<804f0f8c>] (_vm_unmap_aliases) from [<804f4ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3454) r10:83018605 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a8d680 r4:00000000 [<804f4b60>] (vfree) from [<805607fc>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83016170 r8:83e86000 r7:00000000 r6:83018600 r5:00001000 r4:7f051000 [<805607cc>] (execmem_free) from [<803ca974>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1068) r5:00001000 r4:ea5e9000 [<803ca964>] (bpf_jit_free_exec) from [<803cad54>] (bpf_jit_binary_free kernel/bpf/core.c:1114 [inline]) [<803ca964>] (bpf_jit_free_exec) from [<803cad54>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1237) [<803cacf0>] (bpf_jit_free) from [<803cbc74>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2935) r5:85d03794 r4:850bef00 [<803cbb34>] (bpf_prog_free_deferred) from [<80276cec>] (process_one_work+0x1b8/0x4f8 kernel/workqueue.c:3257) r7:ddde3b40 r6:83018600 r5:85d03794 r4:850bef00 [<80276b34>] (process_one_work) from [<8027796c>] (process_scheduled_works kernel/workqueue.c:3340 [inline]) [<80276b34>] (process_one_work) from [<8027796c>] (worker_thread+0x1c4/0x394 kernel/workqueue.c:3421) r10:61c88647 r9:83e86000 r8:82804d80 r7:850bef2c r6:ddde3b40 r5:ddde3b60 r4:850bef00 [<802777a8>] (worker_thread) from [<8027facc>] (kthread+0x128/0x27c kernel/kthread.c:463) r10:00000000 r9:850bef00 r8:802777a8 r7:df93de68 r6:850be580 r5:83e86000 r4:00000001 [<8027f9a4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f5fb0 to 0xdf9f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f9a4 r4:852ff400 INFO: task kworker/1:6:4102 is blocked on a mutex likely owned by task kworker/1:131:4662. task:kworker/1:131 state:R running task stack:0 pid:4662 tgid:4662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81aa9bfc>] (__schedule) from [<81aab2c4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7194) r10:8280c838 r9:8527a400 r8:80200c04 r7:ea555d5c r6:ffffffff r5:8527a400 r4:00000000 [<81aab284>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea555d28 to 0xea555d70) 5d20: a981c000 ebde3000 00000001 802394d0 82ace620 82acf264 5d40: 7f00b000 ebde3000 00000000 00000001 8280c838 ea555d9c ebde3000 ea555d78 5d60: 8023043c 802394e8 80000113 ffffffff r5:80000113 r4:802394e8 [<802303dc>] (flush_tlb_kernel_range) from [<804f0d9c>] (__purge_vmap_area_lazy+0x260/0x450 mm/vmalloc.c:2369) [<804f0b3c>] (__purge_vmap_area_lazy) from [<804f1174>] (_vm_unmap_aliases+0x1e8/0x238 mm/vmalloc.c:2983) r10:00000000 r9:ea555dc0 r8:00000000 r7:ffffffff r6:00000008 r5:ea555e08 r4:ea555dc0 [<804f0f8c>] (_vm_unmap_aliases) from [<804f4ccc>] (vm_reset_perms mm/vmalloc.c:3375 [inline]) [<804f0f8c>] (_vm_unmap_aliases) from [<804f4ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3454) r10:83018605 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a8df00 r4:00000000 [<804f4b60>] (vfree) from [<805607fc>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83016170 r8:8527a400 r7:00000000 r6:83018600 r5:00001000 r4:7f04f000 [<805607cc>] (execmem_free) from [<803ca974>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1068) r5:00001000 r4:ea547000 [<803ca964>] (bpf_jit_free_exec) from [<803cad54>] (bpf_jit_binary_free kernel/bpf/core.c:1114 [inline]) [<803ca964>] (bpf_jit_free_exec) from [<803cad54>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1237) [<803cacf0>] (bpf_jit_free) from [<803cbc74>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2935) r5:85d00394 r4:85431300 [<803cbb34>] (bpf_prog_free_deferred) from [<80276cec>] (process_one_work+0x1b8/0x4f8 kernel/workqueue.c:3257) r7:ddde3b40 r6:83018600 r5:85d00394 r4:85431300 [<80276b34>] (process_one_work) from [<8027796c>] (process_scheduled_works kernel/workqueue.c:3340 [inline]) [<80276b34>] (process_one_work) from [<8027796c>] (worker_thread+0x1c4/0x394 kernel/workqueue.c:3421) r10:61c88647 r9:8527a400 r8:82804d80 r7:8543132c r6:ddde3b40 r5:ddde3b60 r4:85431300 [<802777a8>] (worker_thread) from [<8027facc>] (kthread+0x128/0x27c kernel/kthread.c:463) r10:00000000 r9:85431300 r8:802777a8 r7:ea5dde68 r6:85431380 r5:8527a400 r4:00000001 [<8027f9a4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea555fb0 to 0xea555ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f9a4 r4:855cdbc0 INFO: task kworker/1:10:4112 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:10 state:D stack:0 pid:4112 tgid:4112 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81aa9bfc>] (__schedule) from [<81aaae8c>] (__schedule_loop kernel/sched/core.c:6949 [inline]) [<81aa9bfc>] (__schedule) from [<81aaae8c>] (schedule+0x2c/0x134 kernel/sched/core.c:6964) r10:dfb95d84 r9:00000000 r8:60000113 r7:dfb95d8c r6:829172e8 r5:857a3000 r4:857a3000 [<81aaae60>] (schedule) from [<81aab018>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7021) r5:857a3000 r4:829172e4 [<81aab000>] (schedule_preempt_disabled) from [<81aae5e0>] (__mutex_lock_common kernel/locking/mutex.c:692 [inline]) [<81aab000>] (schedule_preempt_disabled) from [<81aae5e0>] (__mutex_lock.constprop.0+0x584/0xf10 kernel/locking/mutex.c:776) [<81aae05c>] (__mutex_lock.constprop.0) from [<81aaf040>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1065) r10:8280c7e4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb95e08 r4:00000000 [<81aaf02c>] (__mutex_lock_slowpath) from [<81aaf080>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:290) [<81aaf044>] (mutex_lock) from [<804f0fe8>] (_vm_unmap_aliases+0x5c/0x238 mm/vmalloc.c:2944) [<804f0f8c>] (_vm_unmap_aliases) from [<804f4ccc>] (vm_reset_perms mm/vmalloc.c:3375 [inline]) [<804f0f8c>] (_vm_unmap_aliases) from [<804f4ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3454) r10:83018605 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a8db40 r4:00000000 [<804f4b60>] (vfree) from [<805607fc>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83016170 r8:857a3000 r7:00000000 r6:83018600 r5:00001000 r4:7f055000 [<805607cc>] (execmem_free) from [<803ca974>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1068) r5:00001000 r4:ea6cf000 [<803ca964>] (bpf_jit_free_exec) from [<803cad54>] (bpf_jit_binary_free kernel/bpf/core.c:1114 [inline]) [<803ca964>] (bpf_jit_free_exec) from [<803cad54>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1237) [<803cacf0>] (bpf_jit_free) from [<803cbc74>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2935) r5:8572c794 r4:8516b680 [<803cbb34>] (bpf_prog_free_deferred) from [<80276cec>] (process_one_work+0x1b8/0x4f8 kernel/workqueue.c:3257) r7:ddde3b40 r6:83018600 r5:8572c794 r4:8516b680 [<80276b34>] (process_one_work) from [<8027796c>] (process_scheduled_works kernel/workqueue.c:3340 [inline]) [<80276b34>] (process_one_work) from [<8027796c>] (worker_thread+0x1c4/0x394 kernel/workqueue.c:3421) r10:61c88647 r9:857a3000 r8:82804d80 r7:8516b6ac r6:ddde3b40 r5:ddde3b60 r4:8516b680 [<802777a8>] (worker_thread) from [<8027facc>] (kthread+0x128/0x27c kernel/kthread.c:463) r10:00000000 r9:8516b680 r8:802777a8 r7:df9f5e68 r6:8516b900 r5:857a3000 r4:00000001 [<8027f9a4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb95fb0 to 0xdfb95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f9a4 r4:853fcfc0 INFO: task kworker/1:10:4112 is blocked on a mutex likely owned by task kworker/1:131:4662. task:kworker/1:131 state:R running task stack:0 pid:4662 tgid:4662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81aa9bfc>] (__schedule) from [<81aab2c4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7194) r10:8280c838 r9:8527a400 r8:80200c04 r7:ea555d5c r6:ffffffff r5:8527a400 r4:00000000 [<81aab284>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea555d28 to 0xea555d70) 5d20: a981c000 ebde3000 00000001 802394d0 82ace620 82acf264 5d40: 7f00b000 ebde3000 00000000 00000001 8280c838 ea555d9c ebde3000 ea555d78 5d60: 8023043c 802394e8 80000113 ffffffff r5:80000113 r4:802394e8 [<802303dc>] (flush_tlb_kernel_range) from [<804f0d9c>] (__purge_vmap_area_lazy+0x260/0x450 mm/vmalloc.c:2369) [<804f0b3c>] (__purge_vmap_area_lazy) from [<804f1174>] (_vm_unmap_aliases+0x1e8/0x238 mm/vmalloc.c:2983) r10:00000000 r9:ea555dc0 r8:00000000 r7:ffffffff r6:00000008 r5:ea555e08 r4:ea555dc0 [<804f0f8c>] (_vm_unmap_aliases) from [<804f4ccc>] (vm_reset_perms mm/vmalloc.c:3375 [inline]) [<804f0f8c>] (_vm_unmap_aliases) from [<804f4ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3454) r10:83018605 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a8df00 r4:00000000 [<804f4b60>] (vfree) from [<805607fc>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83016170 r8:8527a400 r7:00000000 r6:83018600 r5:00001000 r4:7f04f000 [<805607cc>] (execmem_free) from [<803ca974>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1068) r5:00001000 r4:ea547000 [<803ca964>] (bpf_jit_free_exec) from [<803cad54>] (bpf_jit_binary_free kernel/bpf/core.c:1114 [inline]) [<803ca964>] (bpf_jit_free_exec) from [<803cad54>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1237) [<803cacf0>] (bpf_jit_free) from [<803cbc74>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2935) r5:85d00394 r4:85431300 [<803cbb34>] (bpf_prog_free_deferred) from [<80276cec>] (process_one_work+0x1b8/0x4f8 kernel/workqueue.c:3257) r7:ddde3b40 r6:83018600 r5:85d00394 r4:85431300 [<80276b34>] (process_one_work) from [<8027796c>] (process_scheduled_works kernel/workqueue.c:3340 [inline]) [<80276b34>] (process_one_work) from [<8027796c>] (worker_thread+0x1c4/0x394 kernel/workqueue.c:3421) r10:61c88647 r9:8527a400 r8:82804d80 r7:8543132c r6:ddde3b40 r5:ddde3b60 r4:85431300 [<802777a8>] (worker_thread) from [<8027facc>] (kthread+0x128/0x27c kernel/kthread.c:463) r10:00000000 r9:85431300 r8:802777a8 r7:ea5dde68 r6:85431380 r5:8527a400 r4:00000001 [<8027f9a4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea555fb0 to 0xea555ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f9a4 r4:855cdbc0 INFO: task kworker/0:14:4143 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:14 state:D stack:0 pid:4143 tgid:4143 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81aa9bfc>] (__schedule) from [<81aaae8c>] (__schedule_loop kernel/sched/core.c:6949 [inline]) [<81aa9bfc>] (__schedule) from [<81aaae8c>] (schedule+0x2c/0x134 kernel/sched/core.c:6964) r10:dfc7dd84 r9:00000000 r8:60000013 r7:dfc7dd8c r6:829172e8 r5:844dbc00 r4:844dbc00 [<81aaae60>] (schedule) from [<81aab018>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7021) r5:844dbc00 r4:829172e4 [<81aab000>] (schedule_preempt_disabled) from [<81aae5e0>] (__mutex_lock_common kernel/locking/mutex.c:692 [inline]) [<81aab000>] (schedule_preempt_disabled) from [<81aae5e0>] (__mutex_lock.constprop.0+0x584/0xf10 kernel/locking/mutex.c:776) [<81aae05c>] (__mutex_lock.constprop.0) from [<81aaf040>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1065) r10:8280c7e4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc7de08 r4:00000000 [<81aaf02c>] (__mutex_lock_slowpath) from [<81aaf080>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:290) [<81aaf044>] (mutex_lock) from [<804f0fe8>] (_vm_unmap_aliases+0x5c/0x238 mm/vmalloc.c:2944) [<804f0f8c>] (_vm_unmap_aliases) from [<804f4ccc>] (vm_reset_perms mm/vmalloc.c:3375 [inline]) [<804f0f8c>] (_vm_unmap_aliases) from [<804f4ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3454) r10:83018405 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e8d580 r4:00000000 [<804f4b60>] (vfree) from [<805607fc>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83016170 r8:844dbc00 r7:00000000 r6:83018400 r5:00001000 r4:7f035000 [<805607cc>] (execmem_free) from [<803ca974>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1068) r5:00001000 r4:dfd51000 [<803ca964>] (bpf_jit_free_exec) from [<803cad54>] (bpf_jit_binary_free kernel/bpf/core.c:1114 [inline]) [<803ca964>] (bpf_jit_free_exec) from [<803cad54>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1237) [<803cacf0>] (bpf_jit_free) from [<803cbc74>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2935) r5:8567db94 r4:8565b180 [<803cbb34>] (bpf_prog_free_deferred) from [<80276cec>] (process_one_work+0x1b8/0x4f8 kernel/workqueue.c:3257) r7:dddcfb40 r6:83018400 r5:8567db94 r4:8565b180 [<80276b34>] (process_one_work) from [<8027796c>] (process_scheduled_works kernel/workqueue.c:3340 [inline]) [<80276b34>] (process_one_work) from [<8027796c>] (worker_thread+0x1c4/0x394 kernel/workqueue.c:3421) r10:61c88647 r9:844dbc00 r8:82804d80 r7:8565b1ac r6:dddcfb40 r5:dddcfb60 r4:8565b180 [<802777a8>] (worker_thread) from [<8027facc>] (kthread+0x128/0x27c kernel/kthread.c:463) r10:00000000 r9:8565b180 r8:802777a8 r7:dfb69e68 r6:8565be00 r5:844dbc00 r4:00000001 [<8027f9a4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc7dfb0 to 0xdfc7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f9a4 r4:85642e80 INFO: task kworker/0:14:4143 is blocked on a mutex likely owned by task kworker/1:131:4662. task:kworker/1:131 state:R running task stack:0 pid:4662 tgid:4662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81aa9bfc>] (__schedule) from [<81aab2c4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7194) r10:8280c838 r9:8527a400 r8:80200c04 r7:ea555d5c r6:ffffffff r5:8527a400 r4:00000000 [<81aab284>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea555d28 to 0xea555d70) 5d20: a981c000 ebde3000 00000001 802394d0 82ace620 82acf264 5d40: 7f00b000 ebde3000 00000000 00000001 8280c838 ea555d9c ebde3000 ea555d78 5d60: 8023043c 802394e8 80000113 ffffffff r5:80000113 r4:802394e8 [<802303dc>] (flush_tlb_kernel_range) from [<804f0d9c>] (__purge_vmap_area_lazy+0x260/0x450 mm/vmalloc.c:2369) [<804f0b3c>] (__purge_vmap_area_lazy) from [<804f1174>] (_vm_unmap_aliases+0x1e8/0x238 mm/vmalloc.c:2983) r10:00000000 r9:ea555dc0 r8:00000000 r7:ffffffff r6:00000008 r5:ea555e08 r4:ea555dc0 [<804f0f8c>] (_vm_unmap_aliases) from [<804f4ccc>] (vm_reset_perms mm/vmalloc.c:3375 [inline]) [<804f0f8c>] (_vm_unmap_aliases) from [<804f4ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3454) r10:83018605 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a8df00 r4:00000000 [<804f4b60>] (vfree) from [<805607fc>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83016170 r8:8527a400 r7:00000000 r6:83018600 r5:00001000 r4:7f04f000 [<805607cc>] (execmem_free) from [<803ca974>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1068) r5:00001000 r4:ea547000 [<803ca964>] (bpf_jit_free_exec) from [<803cad54>] (bpf_jit_binary_free kernel/bpf/core.c:1114 [inline]) [<803ca964>] (bpf_jit_free_exec) from [<803cad54>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1237) [<803cacf0>] (bpf_jit_free) from [<803cbc74>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2935) r5:85d00394 r4:85431300 [<803cbb34>] (bpf_prog_free_deferred) from [<80276cec>] (process_one_work+0x1b8/0x4f8 kernel/workqueue.c:3257) r7:ddde3b40 r6:83018600 r5:85d00394 r4:85431300 [<80276b34>] (process_one_work) from [<8027796c>] (process_scheduled_works kernel/workqueue.c:3340 [inline]) [<80276b34>] (process_one_work) from [<8027796c>] (worker_thread+0x1c4/0x394 kernel/workqueue.c:3421) r10:61c88647 r9:8527a400 r8:82804d80 r7:8543132c r6:ddde3b40 r5:ddde3b60 r4:85431300 [<802777a8>] (worker_thread) from [<8027facc>] (kthread+0x128/0x27c kernel/kthread.c:463) r10:00000000 r9:85431300 r8:802777a8 r7:ea5dde68 r6:85431380 r5:8527a400 r4:00000001 [<8027f9a4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea555fb0 to 0xea555ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f9a4 r4:855cdbc0 INFO: task kworker/1:132:4663 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:132 state:D stack:0 pid:4663 tgid:4663 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81aa9bfc>] (__schedule) from [<81aaae8c>] (__schedule_loop kernel/sched/core.c:6949 [inline]) [<81aa9bfc>] (__schedule) from [<81aaae8c>] (schedule+0x2c/0x134 kernel/sched/core.c:6964) r10:ea561d84 r9:00000000 r8:60000013 r7:ea561d8c r6:829172e8 r5:8527b000 r4:8527b000 [<81aaae60>] (schedule) from [<81aab018>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7021) r5:8527b000 r4:829172e4 [<81aab000>] (schedule_preempt_disabled) from [<81aae5e0>] (__mutex_lock_common kernel/locking/mutex.c:692 [inline]) [<81aab000>] (schedule_preempt_disabled) from [<81aae5e0>] (__mutex_lock.constprop.0+0x584/0xf10 kernel/locking/mutex.c:776) [<81aae05c>] (__mutex_lock.constprop.0) from [<81aaf040>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1065) r10:8280c7e4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea561e08 r4:00000000 [<81aaf02c>] (__mutex_lock_slowpath) from [<81aaf080>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:290) [<81aaf044>] (mutex_lock) from [<804f0fe8>] (_vm_unmap_aliases+0x5c/0x238 mm/vmalloc.c:2944) [<804f0f8c>] (_vm_unmap_aliases) from [<804f4ccc>] (vm_reset_perms mm/vmalloc.c:3375 [inline]) [<804f0f8c>] (_vm_unmap_aliases) from [<804f4ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3454) r10:83018605 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852ff740 r4:00000000 [<804f4b60>] (vfree) from [<805607fc>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83016170 r8:8527b000 r7:00000000 r6:83018600 r5:00001000 r4:7f057000 [<805607cc>] (execmem_free) from [<803ca974>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1068) r5:00001000 r4:ea77f000 [<803ca964>] (bpf_jit_free_exec) from [<803cad54>] (bpf_jit_binary_free kernel/bpf/core.c:1114 [inline]) [<803ca964>] (bpf_jit_free_exec) from [<803cad54>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1237) [<803cacf0>] (bpf_jit_free) from [<803cbc74>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2935) r5:8572df94 r4:85431480 [<803cbb34>] (bpf_prog_free_deferred) from [<80276cec>] (process_one_work+0x1b8/0x4f8 kernel/workqueue.c:3257) r7:ddde3b40 r6:83018600 r5:8572df94 r4:85431480 [<80276b34>] (process_one_work) from [<8027796c>] (process_scheduled_works kernel/workqueue.c:3340 [inline]) [<80276b34>] (process_one_work) from [<8027796c>] (worker_thread+0x1c4/0x394 kernel/workqueue.c:3421) r10:61c88647 r9:8527b000 r8:82804d80 r7:854314ac r6:ddde3b40 r5:ddde3b60 r4:85431480 [<802777a8>] (worker_thread) from [<8027facc>] (kthread+0x128/0x27c kernel/kthread.c:463) r10:00000000 r9:85431480 r8:802777a8 r7:ea555e68 r6:85431500 r5:8527b000 r4:00000001 [<8027f9a4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea561fb0 to 0xea561ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f9a4 r4:855cdbc0 INFO: task kworker/1:132:4663 is blocked on a mutex likely owned by task kworker/1:131:4662. task:kworker/1:131 state:R running task stack:0 pid:4662 tgid:4662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81aa9bfc>] (__schedule) from [<81aab2c4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7194) r10:8280c838 r9:8527a400 r8:80200c04 r7:ea555d5c r6:ffffffff r5:8527a400 r4:00000000 [<81aab284>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea555d28 to 0xea555d70) 5d20: a981c000 ebde3000 00000001 802394d0 82ace620 82acf264 5d40: 7f00b000 ebde3000 00000000 00000001 8280c838 ea555d9c ebde3000 ea555d78 5d60: 8023043c 802394e8 80000113 ffffffff r5:80000113 r4:802394e8 [<802303dc>] (flush_tlb_kernel_range) from [<804f0d9c>] (__purge_vmap_area_lazy+0x260/0x450 mm/vmalloc.c:2369) [<804f0b3c>] (__purge_vmap_area_lazy) from [<804f1174>] (_vm_unmap_aliases+0x1e8/0x238 mm/vmalloc.c:2983) r10:00000000 r9:ea555dc0 r8:00000000 r7:ffffffff r6:00000008 r5:ea555e08 r4:ea555dc0 [<804f0f8c>] (_vm_unmap_aliases) from [<804f4ccc>] (vm_reset_perms mm/vmalloc.c:3375 [inline]) [<804f0f8c>] (_vm_unmap_aliases) from [<804f4ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3454) r10:83018605 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a8df00 r4:00000000 [<804f4b60>] (vfree) from [<805607fc>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83016170 r8:8527a400 r7:00000000 r6:83018600 r5:00001000 r4:7f04f000 [<805607cc>] (execmem_free) from [<803ca974>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1068) r5:00001000 r4:ea547000 [<803ca964>] (bpf_jit_free_exec) from [<803cad54>] (bpf_jit_binary_free kernel/bpf/core.c:1114 [inline]) [<803ca964>] (bpf_jit_free_exec) from [<803cad54>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1237) [<803cacf0>] (bpf_jit_free) from [<803cbc74>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2935) r5:85d00394 r4:85431300 [<803cbb34>] (bpf_prog_free_deferred) from [<80276cec>] (process_one_work+0x1b8/0x4f8 kernel/workqueue.c:3257) r7:ddde3b40 r6:83018600 r5:85d00394 r4:85431300 [<80276b34>] (process_one_work) from [<8027796c>] (process_scheduled_works kernel/workqueue.c:3340 [inline]) [<80276b34>] (process_one_work) from [<8027796c>] (worker_thread+0x1c4/0x394 kernel/workqueue.c:3421) r10:61c88647 r9:8527a400 r8:82804d80 r7:8543132c r6:ddde3b40 r5:ddde3b60 r4:85431300 [<802777a8>] (worker_thread) from [<8027facc>] (kthread+0x128/0x27c kernel/kthread.c:463) r10:00000000 r9:85431300 r8:802777a8 r7:ea5dde68 r6:85431380 r5:8527a400 r4:00000001 [<8027f9a4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea555fb0 to 0xea555ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f9a4 r4:855cdbc0 INFO: task kworker/1:133:4682 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:133 state:D stack:0 pid:4682 tgid:4682 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81aa9bfc>] (__schedule) from [<81aaae8c>] (__schedule_loop kernel/sched/core.c:6949 [inline]) [<81aa9bfc>] (__schedule) from [<81aaae8c>] (schedule+0x2c/0x134 kernel/sched/core.c:6964) r10:ea5f5d84 r9:00000000 r8:60000113 r7:ea5f5d8c r6:829172e8 r5:85279800 r4:85279800 [<81aaae60>] (schedule) from [<81aab018>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7021) r5:85279800 r4:829172e4 [<81aab000>] (schedule_preempt_disabled) from [<81aae5e0>] (__mutex_lock_common kernel/locking/mutex.c:692 [inline]) [<81aab000>] (schedule_preempt_disabled) from [<81aae5e0>] (__mutex_lock.constprop.0+0x584/0xf10 kernel/locking/mutex.c:776) [<81aae05c>] (__mutex_lock.constprop.0) from [<81aaf040>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1065) r10:8280c7e4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea5f5e08 r4:00000000 [<81aaf02c>] (__mutex_lock_slowpath) from [<81aaf080>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:290) [<81aaf044>] (mutex_lock) from [<804f0fe8>] (_vm_unmap_aliases+0x5c/0x238 mm/vmalloc.c:2944) [<804f0f8c>] (_vm_unmap_aliases) from [<804f4ccc>] (vm_reset_perms mm/vmalloc.c:3375 [inline]) [<804f0f8c>] (_vm_unmap_aliases) from [<804f4ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3454) r10:83018605 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a8de80 r4:00000000 [<804f4b60>] (vfree) from [<805607fc>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83016170 r8:85279800 r7:00000000 r6:83018600 r5:00001000 r4:7f053000 [<805607cc>] (execmem_free) from [<803ca974>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1068) r5:00001000 r4:ea657000 [<803ca964>] (bpf_jit_free_exec) from [<803cad54>] (bpf_jit_binary_free kernel/bpf/core.c:1114 [inline]) [<803ca964>] (bpf_jit_free_exec) from [<803cad54>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1237) [<803cacf0>] (bpf_jit_free) from [<803cbc74>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2935) r5:85729f94 r4:85431d80 [<803cbb34>] (bpf_prog_free_deferred) from [<80276cec>] (process_one_work+0x1b8/0x4f8 kernel/workqueue.c:3257) r7:ddde3b40 r6:83018600 r5:85729f94 r4:85431d80 [<80276b34>] (process_one_work) from [<8027796c>] (process_scheduled_works kernel/workqueue.c:3340 [inline]) [<80276b34>] (process_one_work) from [<8027796c>] (worker_thread+0x1c4/0x394 kernel/workqueue.c:3421) r10:61c88647 r9:85279800 r8:82804d80 r7:85431dac r6:ddde3b40 r5:ddde3b60 r4:85431d80 [<802777a8>] (worker_thread) from [<8027facc>] (kthread+0x128/0x27c kernel/kthread.c:463) r10:00000000 r9:85431d80 r8:802777a8 r7:ea555e68 r6:85431e80 r5:85279800 r4:00000001 [<8027f9a4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea5f5fb0 to 0xea5f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f9a4 r4:855df5c0 INFO: task kworker/1:133:4682 is blocked on a mutex likely owned by task kworker/1:131:4662. task:kworker/1:131 state:R running task stack:0 pid:4662 tgid:4662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81aa9bfc>] (__schedule) from [<81aab2c4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7194) r10:8280c838 r9:8527a400 r8:80200c04 r7:ea555d5c r6:ffffffff r5:8527a400 r4:00000000 [<81aab284>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea555d28 to 0xea555d70) 5d20: a981c000 ebde3000 00000001 802394d0 82ace620 82acf264 5d40: 7f00b000 ebde3000 00000000 00000001 8280c838 ea555d9c ebde3000 ea555d78 5d60: 8023043c 802394e8 80000113 ffffffff r5:80000113 r4:802394e8 [<802303dc>] (flush_tlb_kernel_range) from [<804f0d9c>] (__purge_vmap_area_lazy+0x260/0x450 mm/vmalloc.c:2369) [<804f0b3c>] (__purge_vmap_area_lazy) from [<804f1174>] (_vm_unmap_aliases+0x1e8/0x238 mm/vmalloc.c:2983) r10:00000000 r9:ea555dc0 r8:00000000 r7:ffffffff r6:00000008 r5:ea555e08 r4:ea555dc0 [<804f0f8c>] (_vm_unmap_aliases) from [<804f4ccc>] (vm_reset_perms mm/vmalloc.c:3375 [inline]) [<804f0f8c>] (_vm_unmap_aliases) from [<804f4ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3454) r10:83018605 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a8df00 r4:00000000 [<804f4b60>] (vfree) from [<805607fc>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83016170 r8:8527a400 r7:00000000 r6:83018600 r5:00001000 r4:7f04f000 [<805607cc>] (execmem_free) from [<803ca974>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1068) r5:00001000 r4:ea547000 [<803ca964>] (bpf_jit_free_exec) from [<803cad54>] (bpf_jit_binary_free kernel/bpf/core.c:1114 [inline]) [<803ca964>] (bpf_jit_free_exec) from [<803cad54>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1237) [<803cacf0>] (bpf_jit_free) from [<803cbc74>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2935) r5:85d00394 r4:85431300 [<803cbb34>] (bpf_prog_free_deferred) from [<80276cec>] (process_one_work+0x1b8/0x4f8 kernel/workqueue.c:3257) r7:ddde3b40 r6:83018600 r5:85d00394 r4:85431300 [<80276b34>] (process_one_work) from [<8027796c>] (process_scheduled_works kernel/workqueue.c:3340 [inline]) [<80276b34>] (process_one_work) from [<8027796c>] (worker_thread+0x1c4/0x394 kernel/workqueue.c:3421) r10:61c88647 r9:8527a400 r8:82804d80 r7:8543132c r6:ddde3b40 r5:ddde3b60 r4:85431300 [<802777a8>] (worker_thread) from [<8027facc>] (kthread+0x128/0x27c kernel/kthread.c:463) r10:00000000 r9:85431300 r8:802777a8 r7:ea5dde68 r6:85431380 r5:8527a400 r4:00000001 [<8027f9a4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea555fb0 to 0xea555ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f9a4 r4:855cdbc0 INFO: task kworker/0:166:4763 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:166 state:D stack:0 pid:4763 tgid:4763 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81aa9bfc>] (__schedule) from [<81aaae8c>] (__schedule_loop kernel/sched/core.c:6949 [inline]) [<81aa9bfc>] (__schedule) from [<81aaae8c>] (schedule+0x2c/0x134 kernel/sched/core.c:6964) r10:ea819d84 r9:00000000 r8:60000113 r7:ea819d8c r6:829172e8 r5:85b99800 r4:85b99800 [<81aaae60>] (schedule) from [<81aab018>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7021) r5:85b99800 r4:829172e4 [<81aab000>] (schedule_preempt_disabled) from [<81aae5e0>] (__mutex_lock_common kernel/locking/mutex.c:692 [inline]) [<81aab000>] (schedule_preempt_disabled) from [<81aae5e0>] (__mutex_lock.constprop.0+0x584/0xf10 kernel/locking/mutex.c:776) [<81aae05c>] (__mutex_lock.constprop.0) from [<81aaf040>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1065) r10:8280c7e4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea819e08 r4:00000000 [<81aaf02c>] (__mutex_lock_slowpath) from [<81aaf080>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:290) [<81aaf044>] (mutex_lock) from [<804f0fe8>] (_vm_unmap_aliases+0x5c/0x238 mm/vmalloc.c:2944) [<804f0f8c>] (_vm_unmap_aliases) from [<804f4ccc>] (vm_reset_perms mm/vmalloc.c:3375 [inline]) [<804f0f8c>] (_vm_unmap_aliases) from [<804f4ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3454) r10:83018405 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c1b440 r4:00000000 [<804f4b60>] (vfree) from [<805607fc>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83016170 r8:85b99800 r7:00000000 r6:83018400 r5:00001000 r4:7f02f000 [<805607cc>] (execmem_free) from [<803ca974>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1068) r5:00001000 r4:dfc0d000 [<803ca964>] (bpf_jit_free_exec) from [<803cad54>] (bpf_jit_binary_free kernel/bpf/core.c:1114 [inline]) [<803ca964>] (bpf_jit_free_exec) from [<803cad54>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1237) [<803cacf0>] (bpf_jit_free) from [<803cbc74>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2935) r5:85d43394 r4:85c16f80 [<803cbb34>] (bpf_prog_free_deferred) from [<80276cec>] (process_one_work+0x1b8/0x4f8 kernel/workqueue.c:3257) r7:dddcfb40 r6:83018400 r5:85d43394 r4:85c16f80 [<80276b34>] (process_one_work) from [<8027796c>] (process_scheduled_works kernel/workqueue.c:3340 [inline]) [<80276b34>] (process_one_work) from [<8027796c>] (worker_thread+0x1c4/0x394 kernel/workqueue.c:3421) r10:61c88647 r9:85b99800 r8:82804d80 r7:85c16fac r6:dddcfb40 r5:dddcfb60 r4:85c16f80 [<802777a8>] (worker_thread) from [<8027facc>] (kthread+0x128/0x27c kernel/kthread.c:463) r10:00000000 r9:85c16f80 r8:802777a8 r7:ea6a5e68 r6:85c16b80 r5:85b99800 r4:00000001 [<8027f9a4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea819fb0 to 0xea819ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f9a4 r4:855e3580 INFO: task kworker/0:166:4763 is blocked on a mutex likely owned by task kworker/1:131:4662. task:kworker/1:131 state:R running task stack:0 pid:4662 tgid:4662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81aa9bfc>] (__schedule) from [<81aab2c4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7194) r10:8280c838 r9:8527a400 r8:80200c04 r7:ea555d5c r6:ffffffff r5:8527a400 r4:00000000 [<81aab284>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea555d28 to 0xea555d70) 5d20: a981c000 ebde3000 00000001 802394d0 82ace620 82acf264 5d40: 7f00b000 ebde3000 00000000 00000001 8280c838 ea555d9c ebde3000 ea555d78 5d60: 8023043c 802394e8 80000113 ffffffff r5:80000113 r4:802394e8 [<802303dc>] (flush_tlb_kernel_range) from [<804f0d9c>] (__purge_vmap_area_lazy+0x260/0x450 mm/vmalloc.c:2369) [<804f0b3c>] (__purge_vmap_area_lazy) from [<804f1174>] (_vm_unmap_aliases+0x1e8/0x238 mm/vmalloc.c:2983) r10:00000000 r9:ea555dc0 r8:00000000 r7:ffffffff r6:00000008 r5:ea555e08 r4:ea555dc0 [<804f0f8c>] (_vm_unmap_aliases) from [<804f4ccc>] (vm_reset_perms mm/vmalloc.c:3375 [inline]) [<804f0f8c>] (_vm_unmap_aliases) from [<804f4ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3454) r10:83018605 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a8df00 r4:00000000 [<804f4b60>] (vfree) from [<805607fc>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83016170 r8:8527a400 r7:00000000 r6:83018600 r5:00001000 r4:7f04f000 [<805607cc>] (execmem_free) from [<803ca974>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1068) r5:00001000 r4:ea547000 [<803ca964>] (bpf_jit_free_exec) from [<803cad54>] (bpf_jit_binary_free kernel/bpf/core.c:1114 [inline]) [<803ca964>] (bpf_jit_free_exec) from [<803cad54>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1237) [<803cacf0>] (bpf_jit_free) from [<803cbc74>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2935) r5:85d00394 r4:85431300 [<803cbb34>] (bpf_prog_free_deferred) from [<80276cec>] (process_one_work+0x1b8/0x4f8 kernel/workqueue.c:3257) r7:ddde3b40 r6:83018600 r5:85d00394 r4:85431300 [<80276b34>] (process_one_work) from [<8027796c>] (process_scheduled_works kernel/workqueue.c:3340 [inline]) [<80276b34>] (process_one_work) from [<8027796c>] (worker_thread+0x1c4/0x394 kernel/workqueue.c:3421) r10:61c88647 r9:8527a400 r8:82804d80 r7:8543132c r6:ddde3b40 r5:ddde3b60 r4:85431300 [<802777a8>] (worker_thread) from [<8027facc>] (kthread+0x128/0x27c kernel/kthread.c:463) r10:00000000 r9:85431300 r8:802777a8 r7:ea5dde68 r6:85431380 r5:8527a400 r4:00000001 [<8027f9a4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea555fb0 to 0xea555ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f9a4 r4:855cdbc0 INFO: task kworker/0:167:4766 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:167 state:D stack:0 pid:4766 tgid:4766 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81aa9bfc>] (__schedule) from [<81aaae8c>] (__schedule_loop kernel/sched/core.c:6949 [inline]) [<81aa9bfc>] (__schedule) from [<81aaae8c>] (schedule+0x2c/0x134 kernel/sched/core.c:6964) r10:ea6add84 r9:00000000 r8:60000113 r7:ea6add8c r6:829172e8 r5:85b9ec00 r4:85b9ec00 [<81aaae60>] (schedule) from [<81aab018>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7021) r5:85b9ec00 r4:829172e4 [<81aab000>] (schedule_preempt_disabled) from [<81aae5e0>] (__mutex_lock_common kernel/locking/mutex.c:692 [inline]) [<81aab000>] (schedule_preempt_disabled) from [<81aae5e0>] (__mutex_lock.constprop.0+0x584/0xf10 kernel/locking/mutex.c:776) [<81aae05c>] (__mutex_lock.constprop.0) from [<81aaf040>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1065) r10:8280c7e4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea6ade08 r4:00000000 [<81aaf02c>] (__mutex_lock_slowpath) from [<81aaf080>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:290) [<81aaf044>] (mutex_lock) from [<804f0fe8>] (_vm_unmap_aliases+0x5c/0x238 mm/vmalloc.c:2944) [<804f0f8c>] (_vm_unmap_aliases) from [<804f4ccc>] (vm_reset_perms mm/vmalloc.c:3375 [inline]) [<804f0f8c>] (_vm_unmap_aliases) from [<804f4ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3454) r10:83018405 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855d6240 r4:00000000 [<804f4b60>] (vfree) from [<805607fc>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83016170 r8:85b9ec00 r7:00000000 r6:83018400 r5:00001000 r4:7f037000 [<805607cc>] (execmem_free) from [<803ca974>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1068) r5:00001000 r4:dfda1000 [<803ca964>] (bpf_jit_free_exec) from [<803cad54>] (bpf_jit_binary_free kernel/bpf/core.c:1114 [inline]) [<803ca964>] (bpf_jit_free_exec) from [<803cad54>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1237) [<803cacf0>] (bpf_jit_free) from [<803cbc74>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2935) r5:853f5f94 r4:85c16580 [<803cbb34>] (bpf_prog_free_deferred) from [<80276cec>] (process_one_work+0x1b8/0x4f8 kernel/workqueue.c:3257) r7:dddcfb40 r6:83018400 r5:853f5f94 r4:85c16580 [<80276b34>] (process_one_work) from [<8027796c>] (process_scheduled_works kernel/workqueue.c:3340 [inline]) [<80276b34>] (process_one_work) from [<8027796c>] (worker_thread+0x1c4/0x394 kernel/workqueue.c:3421) r10:61c88647 r9:85b9ec00 r8:82804d80 r7:85c165ac r6:dddcfb40 r5:dddcfb60 r4:85c16580 [<802777a8>] (worker_thread) from [<8027facc>] (kthread+0x128/0x27c kernel/kthread.c:463) r10:00000000 r9:85c16580 r8:802777a8 r7:ea819e68 r6:85c16080 r5:85b9ec00 r4:00000001 [<8027f9a4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea6adfb0 to 0xea6adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f9a4 r4:846ccd40 INFO: task kworker/0:167:4766 is blocked on a mutex likely owned by task kworker/1:131:4662. task:kworker/1:131 state:R running task stack:0 pid:4662 tgid:4662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81aa9bfc>] (__schedule) from [<81aab2c4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7194) r10:8280c838 r9:8527a400 r8:80200c04 r7:ea555d5c r6:ffffffff r5:8527a400 r4:00000000 [<81aab284>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea555d28 to 0xea555d70) 5d20: a981c000 ebde3000 00000001 802394d0 82ace620 82acf264 5d40: 7f00b000 ebde3000 00000000 00000001 8280c838 ea555d9c ebde3000 ea555d78 5d60: 8023043c 802394e8 80000113 ffffffff r5:80000113 r4:802394e8 [<802303dc>] (flush_tlb_kernel_range) from [<804f0d9c>] (__purge_vmap_area_lazy+0x260/0x450 mm/vmalloc.c:2369) [<804f0b3c>] (__purge_vmap_area_lazy) from [<804f1174>] (_vm_unmap_aliases+0x1e8/0x238 mm/vmalloc.c:2983) r10:00000000 r9:ea555dc0 r8:00000000 r7:ffffffff r6:00000008 r5:ea555e08 r4:ea555dc0 [<804f0f8c>] (_vm_unmap_aliases) from [<804f4ccc>] (vm_reset_perms mm/vmalloc.c:3375 [inline]) [<804f0f8c>] (_vm_unmap_aliases) from [<804f4ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3454) r10:83018605 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a8df00 r4:00000000 [<804f4b60>] (vfree) from [<805607fc>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83016170 r8:8527a400 r7:00000000 r6:83018600 r5:00001000 r4:7f04f000 [<805607cc>] (execmem_free) from [<803ca974>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1068) r5:00001000 r4:ea547000 [<803ca964>] (bpf_jit_free_exec) from [<803cad54>] (bpf_jit_binary_free kernel/bpf/core.c:1114 [inline]) [<803ca964>] (bpf_jit_free_exec) from [<803cad54>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1237) [<803cacf0>] (bpf_jit_free) from [<803cbc74>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2935) r5:85d00394 r4:85431300 [<803cbb34>] (bpf_prog_free_deferred) from [<80276cec>] (process_one_work+0x1b8/0x4f8 kernel/workqueue.c:3257) r7:ddde3b40 r6:83018600 r5:85d00394 r4:85431300 [<80276b34>] (process_one_work) from [<8027796c>] (process_scheduled_works kernel/workqueue.c:3340 [inline]) [<80276b34>] (process_one_work) from [<8027796c>] (worker_thread+0x1c4/0x394 kernel/workqueue.c:3421) r10:61c88647 r9:8527a400 r8:82804d80 r7:8543132c r6:ddde3b40 r5:ddde3b60 r4:85431300 [<802777a8>] (worker_thread) from [<8027facc>] (kthread+0x128/0x27c kernel/kthread.c:463) r10:00000000 r9:85431300 r8:802777a8 r7:ea5dde68 r6:85431380 r5:8527a400 r4:00000001 [<8027f9a4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea555fb0 to 0xea555ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f9a4 r4:855cdbc0 INFO: task kworker/0:168:4768 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:168 state:D stack:0 pid:4768 tgid:4768 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81aa9bfc>] (__schedule) from [<81aaae8c>] (__schedule_loop kernel/sched/core.c:6949 [inline]) [<81aa9bfc>] (__schedule) from [<81aaae8c>] (schedule+0x2c/0x134 kernel/sched/core.c:6964) r10:ea7c1d84 r9:00000000 r8:60000013 r7:ea7c1d8c r6:829172e8 r5:85cc3000 r4:85cc3000 [<81aaae60>] (schedule) from [<81aab018>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7021) r5:85cc3000 r4:829172e4 [<81aab000>] (schedule_preempt_disabled) from [<81aae5e0>] (__mutex_lock_common kernel/locking/mutex.c:692 [inline]) [<81aab000>] (schedule_preempt_disabled) from [<81aae5e0>] (__mutex_lock.constprop.0+0x584/0xf10 kernel/locking/mutex.c:776) [<81aae05c>] (__mutex_lock.constprop.0) from [<81aaf040>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1065) r10:8280c7e4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea7c1e08 r4:00000000 [<81aaf02c>] (__mutex_lock_slowpath) from [<81aaf080>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:290) [<81aaf044>] (mutex_lock) from [<804f0fe8>] (_vm_unmap_aliases+0x5c/0x238 mm/vmalloc.c:2944) [<804f0f8c>] (_vm_unmap_aliases) from [<804f4ccc>] (vm_reset_perms mm/vmalloc.c:3375 [inline]) [<804f0f8c>] (_vm_unmap_aliases) from [<804f4ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3454) r10:83018405 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c1b540 r4:00000000 [<804f4b60>] (vfree) from [<805607fc>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83016170 r8:85cc3000 r7:00000000 r6:83018400 r5:00001000 r4:7f031000 [<805607cc>] (execmem_free) from [<803ca974>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1068) r5:00001000 r4:dfca1000 [<803ca964>] (bpf_jit_free_exec) from [<803cad54>] (bpf_jit_binary_free kernel/bpf/core.c:1114 [inline]) [<803ca964>] (bpf_jit_free_exec) from [<803cad54>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1237) [<803cacf0>] (bpf_jit_free) from [<803cbc74>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2935) r5:85d41394 r4:855ca080 [<803cbb34>] (bpf_prog_free_deferred) from [<80276cec>] (process_one_work+0x1b8/0x4f8 kernel/workqueue.c:3257) r7:dddcfb40 r6:83018400 r5:85d41394 r4:855ca080 [<80276b34>] (process_one_work) from [<8027796c>] (process_scheduled_works kernel/workqueue.c:3340 [inline]) [<80276b34>] (process_one_work) from [<8027796c>] (worker_thread+0x1c4/0x394 kernel/workqueue.c:3421) r10:61c88647 r9:85cc3000 r8:82804d80 r7:855ca0ac r6:dddcfb40 r5:dddcfb60 r4:855ca080 [<802777a8>] (worker_thread) from [<8027facc>] (kthread+0x128/0x27c kernel/kthread.c:463) r10:00000000 r9:855ca080 r8:802777a8 r7:ea819e68 r6:855ca100 r5:85cc3000 r4:00000001 [<8027f9a4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea7c1fb0 to 0xea7c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f9a4 r4:8555c2c0 INFO: task kworker/0:168:4768 is blocked on a mutex likely owned by task kworker/1:131:4662. task:kworker/1:131 state:R running task stack:0 pid:4662 tgid:4662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81aa9bfc>] (__schedule) from [<81aab2c4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7194) r10:8280c838 r9:8527a400 r8:80200c04 r7:ea555d5c r6:ffffffff r5:8527a400 r4:00000000 [<81aab284>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea555d28 to 0xea555d70) 5d20: a981c000 ebde3000 00000001 802394d0 82ace620 82acf264 5d40: 7f00b000 ebde3000 00000000 00000001 8280c838 ea555d9c ebde3000 ea555d78 5d60: 8023043c 802394e8 80000113 ffffffff r5:80000113 r4:802394e8 [<802303dc>] (flush_tlb_kernel_range) from [<804f0d9c>] (__purge_vmap_area_lazy+0x260/0x450 mm/vmalloc.c:2369) [<804f0b3c>] (__purge_vmap_area_lazy) from [<804f1174>] (_vm_unmap_aliases+0x1e8/0x238 mm/vmalloc.c:2983) r10:00000000 r9:ea555dc0 r8:00000000 r7:ffffffff r6:00000008 r5:ea555e08 r4:ea555dc0 [<804f0f8c>] (_vm_unmap_aliases) from [<804f4ccc>] (vm_reset_perms mm/vmalloc.c:3375 [inline]) [<804f0f8c>] (_vm_unmap_aliases) from [<804f4ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3454) r10:83018605 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a8df00 r4:00000000 [<804f4b60>] (vfree) from [<805607fc>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83016170 r8:8527a400 r7:00000000 r6:83018600 r5:00001000 r4:7f04f000 [<805607cc>] (execmem_free) from [<803ca974>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1068) r5:00001000 r4:ea547000 [<803ca964>] (bpf_jit_free_exec) from [<803cad54>] (bpf_jit_binary_free kernel/bpf/core.c:1114 [inline]) [<803ca964>] (bpf_jit_free_exec) from [<803cad54>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1237) [<803cacf0>] (bpf_jit_free) from [<803cbc74>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2935) r5:85d00394 r4:85431300 [<803cbb34>] (bpf_prog_free_deferred) from [<80276cec>] (process_one_work+0x1b8/0x4f8 kernel/workqueue.c:3257) r7:ddde3b40 r6:83018600 r5:85d00394 r4:85431300 [<80276b34>] (process_one_work) from [<8027796c>] (process_scheduled_works kernel/workqueue.c:3340 [inline]) [<80276b34>] (process_one_work) from [<8027796c>] (worker_thread+0x1c4/0x394 kernel/workqueue.c:3421) r10:61c88647 r9:8527a400 r8:82804d80 r7:8543132c r6:ddde3b40 r5:ddde3b60 r4:85431300 [<802777a8>] (worker_thread) from [<8027facc>] (kthread+0x128/0x27c kernel/kthread.c:463) r10:00000000 r9:85431300 r8:802777a8 r7:ea5dde68 r6:85431380 r5:8527a400 r4:00000001 [<8027f9a4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea555fb0 to 0xea555ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f9a4 r4:855cdbc0 INFO: task kworker/0:169:4769 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:169 state:D stack:0 pid:4769 tgid:4769 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81aa9bfc>] (__schedule) from [<81aaae8c>] (__schedule_loop kernel/sched/core.c:6949 [inline]) [<81aa9bfc>] (__schedule) from [<81aaae8c>] (schedule+0x2c/0x134 kernel/sched/core.c:6964) r10:ea6a9d84 r9:00000000 r8:60000013 r7:ea6a9d8c r6:829172e8 r5:85b9bc00 r4:85b9bc00 [<81aaae60>] (schedule) from [<81aab018>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7021) r5:85b9bc00 r4:829172e4 [<81aab000>] (schedule_preempt_disabled) from [<81aae5e0>] (__mutex_lock_common kernel/locking/mutex.c:692 [inline]) [<81aab000>] (schedule_preempt_disabled) from [<81aae5e0>] (__mutex_lock.constprop.0+0x584/0xf10 kernel/locking/mutex.c:776) [<81aae05c>] (__mutex_lock.constprop.0) from [<81aaf040>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1065) r10:8280c7e4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea6a9e08 r4:00000000 [<81aaf02c>] (__mutex_lock_slowpath) from [<81aaf080>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:290) [<81aaf044>] (mutex_lock) from [<804f0fe8>] (_vm_unmap_aliases+0x5c/0x238 mm/vmalloc.c:2944) [<804f0f8c>] (_vm_unmap_aliases) from [<804f4ccc>] (vm_reset_perms mm/vmalloc.c:3375 [inline]) [<804f0f8c>] (_vm_unmap_aliases) from [<804f4ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3454) r10:83018405 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852f8980 r4:00000000 [<804f4b60>] (vfree) from [<805607fc>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83016170 r8:85b9bc00 r7:00000000 r6:83018400 r5:00001000 r4:7f02b000 [<805607cc>] (execmem_free) from [<803ca974>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1068) r5:00001000 r4:dfb77000 [<803ca964>] (bpf_jit_free_exec) from [<803cad54>] (bpf_jit_binary_free kernel/bpf/core.c:1114 [inline]) [<803ca964>] (bpf_jit_free_exec) from [<803cad54>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1237) [<803cacf0>] (bpf_jit_free) from [<803cbc74>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2935) r5:853d8f94 r4:855ca280 [<803cbb34>] (bpf_prog_free_deferred) from [<80276cec>] (process_one_work+0x1b8/0x4f8 kernel/workqueue.c:3257) r7:dddcfb40 r6:83018400 r5:853d8f94 r4:855ca280 [<80276b34>] (process_one_work) from [<8027796c>] (process_scheduled_works kernel/workqueue.c:3340 [inline]) [<80276b34>] (process_one_work) from [<8027796c>] (worker_thread+0x1c4/0x394 kernel/workqueue.c:3421) r10:61c88647 r9:85b9bc00 r8:82804d80 r7:855ca2ac r6:dddcfb40 r5:dddcfb60 r4:855ca280 [<802777a8>] (worker_thread) from [<8027facc>] (kthread+0x128/0x27c kernel/kthread.c:463) r10:00000000 r9:855ca280 r8:802777a8 r7:ea819e68 r6:855ca300 r5:85b9bc00 r4:00000001 [<8027f9a4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea6a9fb0 to 0xea6a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f9a4 r4:8562edc0 INFO: task kworker/0:169:4769 is blocked on a mutex likely owned by task kworker/1:131:4662. task:kworker/1:131 state:R running task stack:0 pid:4662 tgid:4662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81aa9bfc>] (__schedule) from [<81aab2c4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7194) r10:8280c838 r9:8527a400 r8:80200c04 r7:ea555d5c r6:ffffffff r5:8527a400 r4:00000000 [<81aab284>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea555d28 to 0xea555d70) 5d20: a981c000 ebde3000 00000001 802394d0 82ace620 82acf264 5d40: 7f00b000 ebde3000 00000000 00000001 8280c838 ea555d9c ebde3000 ea555d78 5d60: 8023043c 802394e8 80000113 ffffffff r5:80000113 r4:802394e8 [<802303dc>] (flush_tlb_kernel_range) from [<804f0d9c>] (__purge_vmap_area_lazy+0x260/0x450 mm/vmalloc.c:2369) [<804f0b3c>] (__purge_vmap_area_lazy) from [<804f1174>] (_vm_unmap_aliases+0x1e8/0x238 mm/vmalloc.c:2983) r10:00000000 r9:ea555dc0 r8:00000000 r7:ffffffff r6:00000008 r5:ea555e08 r4:ea555dc0 [<804f0f8c>] (_vm_unmap_aliases) from [<804f4ccc>] (vm_reset_perms mm/vmalloc.c:3375 [inline]) [<804f0f8c>] (_vm_unmap_aliases) from [<804f4ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3454) r10:83018605 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a8df00 r4:00000000 [<804f4b60>] (vfree) from [<805607fc>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83016170 r8:8527a400 r7:00000000 r6:83018600 r5:00001000 r4:7f04f000 [<805607cc>] (execmem_free) from [<803ca974>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1068) r5:00001000 r4:ea547000 [<803ca964>] (bpf_jit_free_exec) from [<803cad54>] (bpf_jit_binary_free kernel/bpf/core.c:1114 [inline]) [<803ca964>] (bpf_jit_free_exec) from [<803cad54>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1237) [<803cacf0>] (bpf_jit_free) from [<803cbc74>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2935) r5:85d00394 r4:85431300 [<803cbb34>] (bpf_prog_free_deferred) from [<80276cec>] (process_one_work+0x1b8/0x4f8 kernel/workqueue.c:3257) r7:ddde3b40 r6:83018600 r5:85d00394 r4:85431300 [<80276b34>] (process_one_work) from [<8027796c>] (process_scheduled_works kernel/workqueue.c:3340 [inline]) [<80276b34>] (process_one_work) from [<8027796c>] (worker_thread+0x1c4/0x394 kernel/workqueue.c:3421) r10:61c88647 r9:8527a400 r8:82804d80 r7:8543132c r6:ddde3b40 r5:ddde3b60 r4:85431300 [<802777a8>] (worker_thread) from [<8027facc>] (kthread+0x128/0x27c kernel/kthread.c:463) r10:00000000 r9:85431300 r8:802777a8 r7:ea5dde68 r6:85431380 r5:8527a400 r4:00000001 [<8027f9a4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea555fb0 to 0xea555ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f9a4 r4:855cdbc0 INFO: task kworker/0:170:4771 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:170 state:D stack:0 pid:4771 tgid:4771 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81aa9bfc>] (__schedule) from [<81aaae8c>] (__schedule_loop kernel/sched/core.c:6949 [inline]) [<81aa9bfc>] (__schedule) from [<81aaae8c>] (schedule+0x2c/0x134 kernel/sched/core.c:6964) r10:ea7c9d84 r9:00000000 r8:60000013 r7:ea7c9d8c r6:829172e8 r5:85ba0000 r4:85ba0000 [<81aaae60>] (schedule) from [<81aab018>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7021) r5:85ba0000 r4:829172e4 [<81aab000>] (schedule_preempt_disabled) from [<81aae5e0>] (__mutex_lock_common kernel/locking/mutex.c:692 [inline]) [<81aab000>] (schedule_preempt_disabled) from [<81aae5e0>] (__mutex_lock.constprop.0+0x584/0xf10 kernel/locking/mutex.c:776) [<81aae05c>] (__mutex_lock.constprop.0) from [<81aaf040>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1065) r10:8280c7e4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea7c9e08 r4:00000000 [<81aaf02c>] (__mutex_lock_slowpath) from [<81aaf080>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:290) [<81aaf044>] (mutex_lock) from [<804f0fe8>] (_vm_unmap_aliases+0x5c/0x238 mm/vmalloc.c:2944) [<804f0f8c>] (_vm_unmap_aliases) from [<804f4ccc>] (vm_reset_perms mm/vmalloc.c:3375 [inline]) [<804f0f8c>] (_vm_unmap_aliases) from [<804f4ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3454) r10:83018405 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c1bb00 r4:00000000 [<804f4b60>] (vfree) from [<805607fc>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83016170 r8:85ba0000 r7:00000000 r6:83018400 r5:00001000 r4:7f033000 [<805607cc>] (execmem_free) from [<803ca974>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1068) r5:00001000 r4:dfd03000 [<803ca964>] (bpf_jit_free_exec) from [<803cad54>] (bpf_jit_binary_free kernel/bpf/core.c:1114 [inline]) [<803ca964>] (bpf_jit_free_exec) from [<803cad54>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1237) [<803cacf0>] (bpf_jit_free) from [<803cbc74>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2935) r5:85d41794 r4:855ca480 [<803cbb34>] (bpf_prog_free_deferred) from [<80276cec>] (process_one_work+0x1b8/0x4f8 kernel/workqueue.c:3257) r7:dddcfb40 r6:83018400 r5:85d41794 r4:855ca480 [<80276b34>] (process_one_work) from [<8027796c>] (process_scheduled_works kernel/workqueue.c:3340 [inline]) [<80276b34>] (process_one_work) from [<8027796c>] (worker_thread+0x1c4/0x394 kernel/workqueue.c:3421) r10:61c88647 r9:85ba0000 r8:82804d80 r7:855ca4ac r6:dddcfb40 r5:dddcfb60 r4:855ca480 [<802777a8>] (worker_thread) from [<8027facc>] (kthread+0x128/0x27c kernel/kthread.c:463) r10:00000000 r9:855ca480 r8:802777a8 r7:ea819e68 r6:855ca580 r5:85ba0000 r4:00000001 [<8027f9a4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea7c9fb0 to 0xea7c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f9a4 r4:85c1b300 INFO: task kworker/0:170:4771 is blocked on a mutex likely owned by task kworker/1:131:4662. task:kworker/1:131 state:R running task stack:0 pid:4662 tgid:4662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81aa9bfc>] (__schedule) from [<81aab2c4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7194) r10:8280c838 r9:8527a400 r8:80200c04 r7:ea555d5c r6:ffffffff r5:8527a400 r4:00000000 [<81aab284>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea555d28 to 0xea555d70) 5d20: a981c000 ebde3000 00000001 802394d0 82ace620 82acf264 5d40: 7f00b000 ebde3000 00000000 00000001 8280c838 ea555d9c ebde3000 ea555d78 5d60: 8023043c 802394e8 80000113 ffffffff r5:80000113 r4:802394e8 [<802303dc>] (flush_tlb_kernel_range) from [<804f0d9c>] (__purge_vmap_area_lazy+0x260/0x450 mm/vmalloc.c:2369) [<804f0b3c>] (__purge_vmap_area_lazy) from [<804f1174>] (_vm_unmap_aliases+0x1e8/0x238 mm/vmalloc.c:2983) r10:00000000 r9:ea555dc0 r8:00000000 r7:ffffffff r6:00000008 r5:ea555e08 r4:ea555dc0 [<804f0f8c>] (_vm_unmap_aliases) from [<804f4ccc>] (vm_reset_perms mm/vmalloc.c:3375 [inline]) [<804f0f8c>] (_vm_unmap_aliases) from [<804f4ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3454) r10:83018605 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a8df00 r4:00000000 [<804f4b60>] (vfree) from [<805607fc>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83016170 r8:8527a400 r7:00000000 r6:83018600 r5:00001000 r4:7f04f000 [<805607cc>] (execmem_free) from [<803ca974>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1068) r5:00001000 r4:ea547000 [<803ca964>] (bpf_jit_free_exec) from [<803cad54>] (bpf_jit_binary_free kernel/bpf/core.c:1114 [inline]) [<803ca964>] (bpf_jit_free_exec) from [<803cad54>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1237) [<803cacf0>] (bpf_jit_free) from [<803cbc74>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2935) r5:85d00394 r4:85431300 [<803cbb34>] (bpf_prog_free_deferred) from [<80276cec>] (process_one_work+0x1b8/0x4f8 kernel/workqueue.c:3257) r7:ddde3b40 r6:83018600 r5:85d00394 r4:85431300 [<80276b34>] (process_one_work) from [<8027796c>] (process_scheduled_works kernel/workqueue.c:3340 [inline]) [<80276b34>] (process_one_work) from [<8027796c>] (worker_thread+0x1c4/0x394 kernel/workqueue.c:3421) r10:61c88647 r9:8527a400 r8:82804d80 r7:8543132c r6:ddde3b40 r5:ddde3b60 r4:85431300 [<802777a8>] (worker_thread) from [<8027facc>] (kthread+0x128/0x27c kernel/kthread.c:463) r10:00000000 r9:85431300 r8:802777a8 r7:ea5dde68 r6:85431380 r5:8527a400 r4:00000001 [<8027f9a4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea555fb0 to 0xea555ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f9a4 r4:855cdbc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:171:4775 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:171 state:D stack:0 pid:4775 tgid:4775 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81aa9bfc>] (__schedule) from [<81aaae8c>] (__schedule_loop kernel/sched/core.c:6949 [inline]) [<81aa9bfc>] (__schedule) from [<81aaae8c>] (schedule+0x2c/0x134 kernel/sched/core.c:6964) r10:ea84dd84 r9:00000000 r8:60000013 r7:ea84dd8c r6:829172e8 r5:85ba1800 r4:85ba1800 [<81aaae60>] (schedule) from [<81aab018>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7021) r5:85ba1800 r4:829172e4 [<81aab000>] (schedule_preempt_disabled) from [<81aae5e0>] (__mutex_lock_common kernel/locking/mutex.c:692 [inline]) [<81aab000>] (schedule_preempt_disabled) from [<81aae5e0>] (__mutex_lock.constprop.0+0x584/0xf10 kernel/locking/mutex.c:776) [<81aae05c>] (__mutex_lock.constprop.0) from [<81aaf040>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1065) r10:8280c7e4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea84de08 r4:00000000 [<81aaf02c>] (__mutex_lock_slowpath) from [<81aaf080>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:290) [<81aaf044>] (mutex_lock) from [<804f0fe8>] (_vm_unmap_aliases+0x5c/0x238 mm/vmalloc.c:2944) [<804f0f8c>] (_vm_unmap_aliases) from [<804f4ccc>] (vm_reset_perms mm/vmalloc.c:3375 [inline]) [<804f0f8c>] (_vm_unmap_aliases) from [<804f4ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3454) r10:83018405 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c1b040 r4:00000000 [<804f4b60>] (vfree) from [<805607fc>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83016170 r8:85ba1800 r7:00000000 r6:83018400 r5:00001000 r4:7f02d000 [<805607cc>] (execmem_free) from [<803ca974>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1068) r5:00001000 r4:dfbd1000 [<803ca964>] (bpf_jit_free_exec) from [<803cad54>] (bpf_jit_binary_free kernel/bpf/core.c:1114 [inline]) [<803ca964>] (bpf_jit_free_exec) from [<803cad54>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1237) [<803cacf0>] (bpf_jit_free) from [<803cbc74>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2935) r5:8572bb94 r4:855ca680 [<803cbb34>] (bpf_prog_free_deferred) from [<80276cec>] (process_one_work+0x1b8/0x4f8 kernel/workqueue.c:3257) r7:dddcfb40 r6:83018400 r5:8572bb94 r4:855ca680 [<80276b34>] (process_one_work) from [<8027796c>] (process_scheduled_works kernel/workqueue.c:3340 [inline]) [<80276b34>] (process_one_work) from [<8027796c>] (worker_thread+0x1c4/0x394 kernel/workqueue.c:3421) r10:61c88647 r9:85ba1800 r8:82804d80 r7:855ca6ac r6:dddcfb40 r5:dddcfb60 r4:855ca680 [<802777a8>] (worker_thread) from [<8027facc>] (kthread+0x128/0x27c kernel/kthread.c:463) r10:00000000 r9:855ca680 r8:802777a8 r7:ea6a9e68 r6:855ca700 r5:85ba1800 r4:00000001 [<8027f9a4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea84dfb0 to 0xea84dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f9a4 r4:846cc380 INFO: task kworker/0:171:4775 is blocked on a mutex likely owned by task kworker/1:131:4662. task:kworker/1:131 state:R running task stack:0 pid:4662 tgid:4662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81aa9bfc>] (__schedule) from [<81aab2c4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7194) r10:8280c838 r9:8527a400 r8:80200c04 r7:ea555d5c r6:ffffffff r5:8527a400 r4:00000000 [<81aab284>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea555d28 to 0xea555d70) 5d20: a981c000 ebde3000 00000001 802394d0 82ace620 82acf264 5d40: 7f00b000 ebde3000 00000000 00000001 8280c838 ea555d9c ebde3000 ea555d78 5d60: 8023043c 802394e8 80000113 ffffffff r5:80000113 r4:802394e8 [<802303dc>] (flush_tlb_kernel_range) from [<804f0d9c>] (__purge_vmap_area_lazy+0x260/0x450 mm/vmalloc.c:2369) [<804f0b3c>] (__purge_vmap_area_lazy) from [<804f1174>] (_vm_unmap_aliases+0x1e8/0x238 mm/vmalloc.c:2983) r10:00000000 r9:ea555dc0 r8:00000000 r7:ffffffff r6:00000008 r5:ea555e08 r4:ea555dc0 [<804f0f8c>] (_vm_unmap_aliases) from [<804f4ccc>] (vm_reset_perms mm/vmalloc.c:3375 [inline]) [<804f0f8c>] (_vm_unmap_aliases) from [<804f4ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3454) r10:83018605 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a8df00 r4:00000000 [<804f4b60>] (vfree) from [<805607fc>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83016170 r8:8527a400 r7:00000000 r6:83018600 r5:00001000 r4:7f04f000 [<805607cc>] (execmem_free) from [<803ca974>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1068) r5:00001000 r4:ea547000 [<803ca964>] (bpf_jit_free_exec) from [<803cad54>] (bpf_jit_binary_free kernel/bpf/core.c:1114 [inline]) [<803ca964>] (bpf_jit_free_exec) from [<803cad54>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1237) [<803cacf0>] (bpf_jit_free) from [<803cbc74>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2935) r5:85d00394 r4:85431300 [<803cbb34>] (bpf_prog_free_deferred) from [<80276cec>] (process_one_work+0x1b8/0x4f8 kernel/workqueue.c:3257) r7:ddde3b40 r6:83018600 r5:85d00394 r4:85431300 [<80276b34>] (process_one_work) from [<8027796c>] (process_scheduled_works kernel/workqueue.c:3340 [inline]) [<80276b34>] (process_one_work) from [<8027796c>] (worker_thread+0x1c4/0x394 kernel/workqueue.c:3421) r10:61c88647 r9:8527a400 r8:82804d80 r7:8543132c r6:ddde3b40 r5:ddde3b60 r4:85431300 [<802777a8>] (worker_thread) from [<8027facc>] (kthread+0x128/0x27c kernel/kthread.c:463) r10:00000000 r9:85431300 r8:802777a8 r7:ea5dde68 r6:85431380 r5:8527a400 r4:00000001 [<8027f9a4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea555fb0 to 0xea555ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f9a4 r4:855cdbc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:174:4781 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:174 state:D stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81aa9bfc>] (__schedule) from [<81aaae8c>] (__schedule_loop kernel/sched/core.c:6949 [inline]) [<81aa9bfc>] (__schedule) from [<81aaae8c>] (schedule+0x2c/0x134 kernel/sched/core.c:6964) r10:ea7c5d84 r9:00000000 r8:60000013 r7:ea7c5d8c r6:829172e8 r5:85cd0000 r4:85cd0000 [<81aaae60>] (schedule) from [<81aab018>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7021) r5:85cd0000 r4:829172e4 [<81aab000>] (schedule_preempt_disabled) from [<81aae5e0>] (__mutex_lock_common kernel/locking/mutex.c:692 [inline]) [<81aab000>] (schedule_preempt_disabled) from [<81aae5e0>] (__mutex_lock.constprop.0+0x584/0xf10 kernel/locking/mutex.c:776) [<81aae05c>] (__mutex_lock.constprop.0) from [<81aaf040>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1065) r10:8280c7e4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea7c5e08 r4:00000000 [<81aaf02c>] (__mutex_lock_slowpath) from [<81aaf080>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:290) [<81aaf044>] (mutex_lock) from [<804f0fe8>] (_vm_unmap_aliases+0x5c/0x238 mm/vmalloc.c:2944) [<804f0f8c>] (_vm_unmap_aliases) from [<804f4ccc>] (vm_reset_perms mm/vmalloc.c:3375 [inline]) [<804f0f8c>] (_vm_unmap_aliases) from [<804f4ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3454) r10:83018405 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852f8e40 r4:00000000 [<804f4b60>] (vfree) from [<805607fc>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83016170 r8:85cd0000 r7:00000000 r6:83018400 r5:00001000 r4:7f00d000 [<805607cc>] (execmem_free) from [<803ca974>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1068) r5:00001000 r4:dfb11000 [<803ca964>] (bpf_jit_free_exec) from [<803cad54>] (bpf_jit_binary_free kernel/bpf/core.c:1114 [inline]) [<803ca964>] (bpf_jit_free_exec) from [<803cad54>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1237) [<803cacf0>] (bpf_jit_free) from [<803cbc74>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2935) r5:8572a394 r4:855cab80 [<803cbb34>] (bpf_prog_free_deferred) from [<80276cec>] (process_one_work+0x1b8/0x4f8 kernel/workqueue.c:3257) r7:dddcfb40 r6:83018400 r5:8572a394 r4:855cab80 [<80276b34>] (process_one_work) from [<8027796c>] (process_scheduled_works kernel/workqueue.c:3340 [inline]) [<80276b34>] (process_one_work) from [<8027796c>] (worker_thread+0x1c4/0x394 kernel/workqueue.c:3421) r10:61c88647 r9:85cd0000 r8:82804d80 r7:855cabac r6:dddcfb40 r5:dddcfb60 r4:855cab80 [<802777a8>] (worker_thread) from [<8027facc>] (kthread+0x128/0x27c kernel/kthread.c:463) r10:00000000 r9:855cab80 r8:802777a8 r7:ea725e68 r6:8555fe80 r5:85cd0000 r4:00000001 [<8027f9a4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea7c5fb0 to 0xea7c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f9a4 r4:8555cb00 INFO: task kworker/0:174:4781 is blocked on a mutex likely owned by task kworker/1:131:4662. task:kworker/1:131 state:R running task stack:0 pid:4662 tgid:4662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81aa9bfc>] (__schedule) from [<81aab2c4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7194) r10:8280c838 r9:8527a400 r8:80200c04 r7:ea555d5c r6:ffffffff r5:8527a400 r4:00000000 [<81aab284>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea555d28 to 0xea555d70) 5d20: a981c000 ebde3000 00000001 802394d0 82ace620 82acf264 5d40: 7f00b000 ebde3000 00000000 00000001 8280c838 ea555d9c ebde3000 ea555d78 5d60: 8023043c 802394e8 80000113 ffffffff r5:80000113 r4:802394e8 [<802303dc>] (flush_tlb_kernel_range) from [<804f0d9c>] (__purge_vmap_area_lazy+0x260/0x450 mm/vmalloc.c:2369) [<804f0b3c>] (__purge_vmap_area_lazy) from [<804f1174>] (_vm_unmap_aliases+0x1e8/0x238 mm/vmalloc.c:2983) r10:00000000 r9:ea555dc0 r8:00000000 r7:ffffffff r6:00000008 r5:ea555e08 r4:ea555dc0 [<804f0f8c>] (_vm_unmap_aliases) from [<804f4ccc>] (vm_reset_perms mm/vmalloc.c:3375 [inline]) [<804f0f8c>] (_vm_unmap_aliases) from [<804f4ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3454) r10:83018605 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a8df00 r4:00000000 [<804f4b60>] (vfree) from [<805607fc>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83016170 r8:8527a400 r7:00000000 r6:83018600 r5:00001000 r4:7f04f000 [<805607cc>] (execmem_free) from [<803ca974>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1068) r5:00001000 r4:ea547000 [<803ca964>] (bpf_jit_free_exec) from [<803cad54>] (bpf_jit_binary_free kernel/bpf/core.c:1114 [inline]) [<803ca964>] (bpf_jit_free_exec) from [<803cad54>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1237) [<803cacf0>] (bpf_jit_free) from [<803cbc74>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2935) r5:85d00394 r4:85431300 [<803cbb34>] (bpf_prog_free_deferred) from [<80276cec>] (process_one_work+0x1b8/0x4f8 kernel/workqueue.c:3257) r7:ddde3b40 r6:83018600 r5:85d00394 r4:85431300 [<80276b34>] (process_one_work) from [<8027796c>] (process_scheduled_works kernel/workqueue.c:3340 [inline]) [<80276b34>] (process_one_work) from [<8027796c>] (worker_thread+0x1c4/0x394 kernel/workqueue.c:3421) r10:61c88647 r9:8527a400 r8:82804d80 r7:8543132c r6:ddde3b40 r5:ddde3b60 r4:85431300 [<802777a8>] (worker_thread) from [<8027facc>] (kthread+0x128/0x27c kernel/kthread.c:463) r10:00000000 r9:85431300 r8:802777a8 r7:ea5dde68 r6:85431380 r5:8527a400 r4:00000001 [<8027f9a4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea555fb0 to 0xea555ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f9a4 r4:855cdbc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:178:4789 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:178 state:D stack:0 pid:4789 tgid:4789 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81aa9bfc>] (__schedule) from [<81aaae8c>] (__schedule_loop kernel/sched/core.c:6949 [inline]) [<81aa9bfc>] (__schedule) from [<81aaae8c>] (schedule+0x2c/0x134 kernel/sched/core.c:6964) r10:ea799d84 r9:00000000 r8:60000013 r7:ea799d8c r6:829172e8 r5:85cd3c00 r4:85cd3c00 [<81aaae60>] (schedule) from [<81aab018>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7021) r5:85cd3c00 r4:829172e4 [<81aab000>] (schedule_preempt_disabled) from [<81aae5e0>] (__mutex_lock_common kernel/locking/mutex.c:692 [inline]) [<81aab000>] (schedule_preempt_disabled) from [<81aae5e0>] (__mutex_lock.constprop.0+0x584/0xf10 kernel/locking/mutex.c:776) [<81aae05c>] (__mutex_lock.constprop.0) from [<81aaf040>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1065) r10:8280c7e4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea799e08 r4:00000000 [<81aaf02c>] (__mutex_lock_slowpath) from [<81aaf080>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:290) [<81aaf044>] (mutex_lock) from [<804f0fe8>] (_vm_unmap_aliases+0x5c/0x238 mm/vmalloc.c:2944) [<804f0f8c>] (_vm_unmap_aliases) from [<804f4ccc>] (vm_reset_perms mm/vmalloc.c:3375 [inline]) [<804f0f8c>] (_vm_unmap_aliases) from [<804f4ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3454) r10:83018405 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852f82c0 r4:00000000 [<804f4b60>] (vfree) from [<805607fc>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83016170 r8:85cd3c00 r7:00000000 r6:83018400 r5:00001000 r4:7f00b000 [<805607cc>] (execmem_free) from [<803ca974>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1068) r5:00001000 r4:dfaa1000 [<803ca964>] (bpf_jit_free_exec) from [<803cad54>] (bpf_jit_binary_free kernel/bpf/core.c:1114 [inline]) [<803ca964>] (bpf_jit_free_exec) from [<803cad54>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1237) [<803cacf0>] (bpf_jit_free) from [<803cbc74>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2935) r5:8572b394 r4:855cae80 [<803cbb34>] (bpf_prog_free_deferred) from [<80276cec>] (process_one_work+0x1b8/0x4f8 kernel/workqueue.c:3257) r7:dddcfb40 r6:83018400 r5:8572b394 r4:855cae80 [<80276b34>] (process_one_work) from [<8027796c>] (process_scheduled_works kernel/workqueue.c:3340 [inline]) [<80276b34>] (process_one_work) from [<8027796c>] (worker_thread+0x1c4/0x394 kernel/workqueue.c:3421) r10:61c88647 r9:85cd3c00 r8:82804d80 r7:855caeac r6:dddcfb40 r5:dddcfb60 r4:855cae80 [<802777a8>] (worker_thread) from [<8027facc>] (kthread+0x128/0x27c kernel/kthread.c:463) r10:00000000 r9:855cae80 r8:802777a8 r7:ea77de68 r6:85d65080 r5:85cd3c00 r4:00000001 [<8027f9a4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea799fb0 to 0xea799ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f9a4 r4:85d689c0 INFO: task kworker/0:178:4789 is blocked on a mutex likely owned by task kworker/1:131:4662. task:kworker/1:131 state:R running task stack:0 pid:4662 tgid:4662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81aa9bfc>] (__schedule) from [<81aab2c4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7194) r10:8280c838 r9:8527a400 r8:80200c04 r7:ea555d5c r6:ffffffff r5:8527a400 r4:00000000 [<81aab284>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea555d28 to 0xea555d70) 5d20: a981c000 ebde3000 00000001 802394d0 82ace620 82acf264 5d40: 7f00b000 ebde3000 00000000 00000001 8280c838 ea555d9c ebde3000 ea555d78 5d60: 8023043c 802394e8 80000113 ffffffff r5:80000113 r4:802394e8 [<802303dc>] (flush_tlb_kernel_range) from [<804f0d9c>] (__purge_vmap_area_lazy+0x260/0x450 mm/vmalloc.c:2369) [<804f0b3c>] (__purge_vmap_area_lazy) from [<804f1174>] (_vm_unmap_aliases+0x1e8/0x238 mm/vmalloc.c:2983) r10:00000000 r9:ea555dc0 r8:00000000 r7:ffffffff r6:00000008 r5:ea555e08 r4:ea555dc0 [<804f0f8c>] (_vm_unmap_aliases) from [<804f4ccc>] (vm_reset_perms mm/vmalloc.c:3375 [inline]) [<804f0f8c>] (_vm_unmap_aliases) from [<804f4ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3454) r10:83018605 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a8df00 r4:00000000 [<804f4b60>] (vfree) from [<805607fc>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83016170 r8:8527a400 r7:00000000 r6:83018600 r5:00001000 r4:7f04f000 [<805607cc>] (execmem_free) from [<803ca974>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1068) r5:00001000 r4:ea547000 [<803ca964>] (bpf_jit_free_exec) from [<803cad54>] (bpf_jit_binary_free kernel/bpf/core.c:1114 [inline]) [<803ca964>] (bpf_jit_free_exec) from [<803cad54>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1237) [<803cacf0>] (bpf_jit_free) from [<803cbc74>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2935) r5:85d00394 r4:85431300 [<803cbb34>] (bpf_prog_free_deferred) from [<80276cec>] (process_one_work+0x1b8/0x4f8 kernel/workqueue.c:3257) r7:ddde3b40 r6:83018600 r5:85d00394 r4:85431300 [<80276b34>] (process_one_work) from [<8027796c>] (process_scheduled_works kernel/workqueue.c:3340 [inline]) [<80276b34>] (process_one_work) from [<8027796c>] (worker_thread+0x1c4/0x394 kernel/workqueue.c:3421) r10:61c88647 r9:8527a400 r8:82804d80 r7:8543132c r6:ddde3b40 r5:ddde3b60 r4:85431300 [<802777a8>] (worker_thread) from [<8027facc>] (kthread+0x128/0x27c kernel/kthread.c:463) r10:00000000 r9:85431300 r8:802777a8 r7:ea5dde68 r6:85431380 r5:8527a400 r4:00000001 [<8027f9a4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea555fb0 to 0xea555ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f9a4 r4:855cdbc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 30 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT Hardware name: ARM-Versatile Express Call trace: [<80201a40>] (dump_backtrace) from [<80201b34>] (show_stack+0x18/0x1c arch/arm/kernel/traps.c:257) r7:600e0093 r6:600e0093 r5:822a2110 r4:00000000 [<80201b1c>] (show_stack) from [<8021ed6c>] (__dump_stack lib/dump_stack.c:94 [inline]) [<80201b1c>] (show_stack) from [<8021ed6c>] (dump_stack_lvl+0x5c/0x70 lib/dump_stack.c:120) [<8021ed10>] (dump_stack_lvl) from [<8021ed98>] (dump_stack+0x18/0x1c lib/dump_stack.c:129) r7:00000000 r6:000e0013 r5:00000000 r4:00000001 [<8021ed80>] (dump_stack) from [<81a9383c>] (nmi_cpu_backtrace+0x150/0x170 lib/nmi_backtrace.c:113) [<81a936ec>] (nmi_cpu_backtrace) from [<81a9398c>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8 lib/nmi_backtrace.c:62) r7:00000000 r6:8280c510 r5:8281ad9c r4:ffffffff [<81a9385c>] (nmi_trigger_cpumask_backtrace) from [<8022fe60>] (arch_trigger_cpumask_backtrace+0x18/0x1c arch/arm/kernel/smp.c:852) r9:82ac382c r8:8280c690 r7:82804d80 r6:85cd43f0 r5:00007bdc r4:00000048 [<8022fe48>] (arch_trigger_cpumask_backtrace) from [<81a9b470>] (trigger_all_cpu_backtrace include/linux/nmi.h:161 [inline]) [<8022fe48>] (arch_trigger_cpumask_backtrace) from [<81a9b470>] (__sys_info lib/sys_info.c:157 [inline]) [<8022fe48>] (arch_trigger_cpumask_backtrace) from [<81a9b470>] (sys_info+0x68/0xa8 lib/sys_info.c:165) [<81a9b408>] (sys_info) from [<80382fc4>] (check_hung_uninterruptible_tasks kernel/hung_task.c:346 [inline]) [<81a9b408>] (sys_info) from [<80382fc4>] (watchdog+0x458/0x888 kernel/hung_task.c:515) r5:00007bdc r4:8610f50c [<80382b6c>] (watchdog) from [<8027facc>] (kthread+0x128/0x27c kernel/kthread.c:463) r10:00000000 r9:00000000 r8:80382b6c r7:832a3e00 r6:832a3e00 r5:832e2400 r4:00000001 [<8027f9a4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf8d9fb0 to 0xdf8d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f9a4 r4:8336b080 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 2813 Comm: pr/ttyAMA-1 Not tainted syzkaller #0 PREEMPT Hardware name: ARM-Versatile Express PC is at __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:152 [inline] PC is at _raw_spin_unlock_irqrestore+0x28/0x54 kernel/locking/spinlock.c:194 LR is at spin_unlock_irqrestore include/linux/spinlock.h:406 [inline] LR is at __uart_port_unlock_irqrestore include/linux/serial_core.h:616 [inline] LR is at pl011_console_device_unlock+0x20/0x24 drivers/tty/serial/amba-pl011.c:2603 pc : [<81ab4ad0>] lr : [<80aa46a4>] psr: 60000013 sp : eb1e9eb0 ip : eb1e9ec0 fp : eb1e9ebc r10: 8295971c r9 : 00000001 r8 : 00000000 r7 : 00000117 r6 : 82959680 r5 : 00000000 r4 : 00000001 r3 : 00000797 r2 : 00000000 r1 : 60000013 r0 : 846c0c40 Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none Control: 30c5387d Table: 85182840 DAC: 00000000 Call trace: [<81ab4aa8>] (_raw_spin_unlock_irqrestore) from [<80aa46a4>] (spin_unlock_irqrestore include/linux/spinlock.h:406 [inline]) [<81ab4aa8>] (_raw_spin_unlock_irqrestore) from [<80aa46a4>] (__uart_port_unlock_irqrestore include/linux/serial_core.h:616 [inline]) [<81ab4aa8>] (_raw_spin_unlock_irqrestore) from [<80aa46a4>] (pl011_console_device_unlock+0x20/0x24 drivers/tty/serial/amba-pl011.c:2603) [<80aa4684>] (pl011_console_device_unlock) from [<802e5108>] (nbcon_emit_one+0x88/0x100 kernel/printk/nbcon.c:1149) [<802e5080>] (nbcon_emit_one) from [<802e5388>] (nbcon_kthread_func+0x208/0x2ec kernel/printk/nbcon.c:1255) r6:82ac0104 r5:82959680 r4:844dc800 [<802e5180>] (nbcon_kthread_func) from [<8027facc>] (kthread+0x128/0x27c kernel/kthread.c:463) r10:00000000 r9:82959680 r8:802e5180 r7:84708e00 r6:84708e00 r5:844dc800 r4:00000001 [<8027f9a4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1e9fb0 to 0xeb1e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f9a4 r4:85034d80