Extracting prog: 6m19.100367871s Minimizing prog: 1h21m36.492773077s Simplifying prog options: 0s Extracting C: 9m43.175852877s Simplifying C: 1h5m15.355829263s extracting reproducer from 1 programs testing a last program of every proc single: executing 1 programs separately with timeout 45s testing program (duration=45s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false CallComments:true LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN-socket$inet_tcp detailed listing: executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000070000000000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000a80)='kfree\x00', r0, 0x0, 0xd76}, 0x18) socket$inet_tcp(0x2, 0x1, 0x0) program did not crash single: failed to extract reproducer single: executing 1 programs separately with timeout 16m0s testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false CallComments:true LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN-socket$inet_tcp detailed listing: executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000070000000000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000a80)='kfree\x00', r0, 0x0, 0xd76}, 0x18) socket$inet_tcp(0x2, 0x1, 0x0) program crashed: lost connection to test machine single: successfully extracted reproducer found reproducer with 3 syscalls minimizing guilty program testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false CallComments:true LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN detailed listing: executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000070000000000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000a80)='kfree\x00', r0, 0x0, 0xd76}, 0x18) program crashed: lost connection to test machine testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false CallComments:true LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD detailed listing: executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000070000000000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2000}, 0x94) program crashed: INFO: task hung in _vm_unmap_aliases testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false CallComments:true LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD detailed listing: executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false CallComments:true LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD detailed listing: executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2000}, 0x94) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false CallComments:true LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD detailed listing: executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2000}, 0x94) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false CallComments:true LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD detailed listing: executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000070000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2000}, 0x94) program did not crash extracting C reproducer testing compiled C program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false CallComments:true LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases simplifying C reproducer testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false CallComments:true LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false CallComments:true LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:true HandleSegv:true Trace:false CallComments:true LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:false HandleSegv:true Trace:false CallComments:true LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:false HandleSegv:false Trace:false CallComments:true LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:false Swap:false UseTmpDir:false HandleSegv:false Trace:false CallComments:true LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:false Swap:false UseTmpDir:false HandleSegv:false Trace:false CallComments:true LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD detailed listing: executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000070000000000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2000}, 0x94) program crashed: INFO: task hung in _vm_unmap_aliases validation run: crashed=true testing program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:false Swap:false UseTmpDir:false HandleSegv:false Trace:false CallComments:true LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD detailed listing: executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000070000000000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2000}, 0x94) program crashed: INFO: task hung in _vm_unmap_aliases validation run: crashed=true testing program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:false Swap:false UseTmpDir:false HandleSegv:false Trace:false CallComments:true LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD detailed listing: executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000070000000000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2000}, 0x94) program did not crash validation run: crashed=false testing program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:false Swap:false UseTmpDir:false HandleSegv:false Trace:false CallComments:true LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD detailed listing: executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000070000000000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2000}, 0x94) program crashed: INFO: task hung in _vm_unmap_aliases validation run: crashed=true reproducing took 3h48m59.463924756s repro crashed as (corrupted=false): INFO: task kworker/1:0:23 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:0 state:D stack:0 pid:23 tgid:23 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65250>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a642bc>] (__schedule) from [<81a65250>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:df879d84 r9:00000002 r8:60000113 r7:829171a0 r6:df879d8c r5:8321a400 r4:8321a400 [<81a65224>] (schedule) from [<81a65638>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:8321a400 r4:8291719c [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67e98>] (__mutex_lock.constprop.0) from [<81a68990>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df879e08 r4:00000000 [<81a6897c>] (__mutex_lock_slowpath) from [<81a689d0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68994>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d85d80 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:8321a400 r7:00000000 r6:83018600 r5:00001000 r4:7f027000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfa65000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84f3978c r4:830cf000 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84f3978c r4:830cf000 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:8321a400 r8:830cf02c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:830cf000 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:830cf000 r8:80278fec r7:df819d50 r6:830cf080 r5:8321a400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf879fb0 to 0xdf879ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:830cd200 INFO: task kworker/1:0:23 is blocked on a mutex likely owned by task kworker/1:43:4405. task:kworker/1:43 state:R running task stack:0 pid:4405 tgid:4405 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65684>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:84b5c800 r8:80200c04 r7:df9e5d54 r6:ffffffff r5:84b5c800 r4:00000000 [<81a65644>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdf9e5d20 to 0xdf9e5d68) 5d20: c787b000 eba7b000 00000001 80239bf8 7f027000 00000001 82acb1c4 82aca5a0 5d40: 7f027000 eba7b000 8280c9b4 df9e5d9c df9e5da0 df9e5d70 80230af0 80239c10 5d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9e5dc0 r5:df9e5e08 r4:df9e5dc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85874800 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84b5c800 r7:00000000 r6:83018600 r5:00001000 r4:7f029000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfba5000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:855b2f8c r4:856ce400 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:855b2f8c r4:856ce400 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84b5c800 r8:856ce42c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856ce400 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856ce400 r8:80278fec r7:dfbe5e60 r6:856ce480 r5:84b5c800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e5fb0 to 0xdf9e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:856c9b40 INFO: task kworker/1:5:4185 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:5 state:D stack:0 pid:4185 tgid:4185 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65250>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a642bc>] (__schedule) from [<81a65250>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:df9b5d84 r9:00000002 r8:60000013 r7:829171a0 r6:df9b5d8c r5:8487d400 r4:8487d400 [<81a65224>] (schedule) from [<81a65638>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:8487d400 r4:8291719c [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67e98>] (__mutex_lock.constprop.0) from [<81a68990>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9b5e08 r4:00000000 [<81a6897c>] (__mutex_lock_slowpath) from [<81a689d0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68994>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d85c80 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:8487d400 r7:00000000 r6:83018600 r5:00001000 r4:7f035000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfaff000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84f3938c r4:857a9f00 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84f3938c r4:857a9f00 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:8487d400 r8:857a9f2c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:857a9f00 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:857a9f00 r8:80278fec r7:dfaa9e60 r6:857a9e80 r5:8487d400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9b5fb0 to 0xdf9b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85779a80 INFO: task kworker/1:5:4185 is blocked on a mutex likely owned by task kworker/1:43:4405. task:kworker/1:43 state:R running task stack:0 pid:4405 tgid:4405 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65684>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:84b5c800 r8:80200c04 r7:df9e5d54 r6:ffffffff r5:84b5c800 r4:00000000 [<81a65644>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdf9e5d20 to 0xdf9e5d68) 5d20: c8252000 eba7b000 00000001 80239bf8 7f027000 00000001 82acb1c4 82aca5a0 5d40: 7f027000 eba7b000 8280c9b4 df9e5d9c df9e5da0 df9e5d70 80230af0 80239c10 5d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9e5dc0 r5:df9e5e08 r4:df9e5dc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85874800 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84b5c800 r7:00000000 r6:83018600 r5:00001000 r4:7f029000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfba5000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:855b2f8c r4:856ce400 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:855b2f8c r4:856ce400 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84b5c800 r8:856ce42c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856ce400 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856ce400 r8:80278fec r7:dfbe5e60 r6:856ce480 r5:84b5c800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e5fb0 to 0xdf9e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:856c9b40 INFO: task kworker/1:8:4193 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:8 state:D stack:0 pid:4193 tgid:4193 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65250>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a642bc>] (__schedule) from [<81a65250>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:dfb09d84 r9:00000002 r8:60000013 r7:829171a0 r6:dfb09d8c r5:8487e000 r4:8487e000 [<81a65224>] (schedule) from [<81a65638>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:8487e000 r4:8291719c [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67e98>] (__mutex_lock.constprop.0) from [<81a68990>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb09e08 r4:00000000 [<81a6897c>] (__mutex_lock_slowpath) from [<81a689d0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68994>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85559740 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:8487e000 r7:00000000 r6:83018600 r5:00001000 r4:7f031000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:e009b000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85473b8c r4:857a9980 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:85473b8c r4:857a9980 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:8487e000 r8:857a99ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:857a9980 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:857a9980 r8:80278fec r7:dfb39e60 r6:857a9800 r5:8487e000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb09fb0 to 0xdfb09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:8555d140 INFO: task kworker/1:8:4193 is blocked on a mutex likely owned by task kworker/1:43:4405. task:kworker/1:43 state:R running task stack:0 pid:4405 tgid:4405 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65684>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:84b5c800 r8:80200c04 r7:df9e5d54 r6:ffffffff r5:84b5c800 r4:00000000 [<81a65644>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdf9e5d20 to 0xdf9e5d68) 5d20: c8252000 eba7b000 00000001 80239bf8 7f027000 00000001 82acb1c4 82aca5a0 5d40: 7f027000 eba7b000 8280c9b4 df9e5d9c df9e5da0 df9e5d70 80230af0 80239c10 5d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9e5dc0 r5:df9e5e08 r4:df9e5dc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85874800 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84b5c800 r7:00000000 r6:83018600 r5:00001000 r4:7f029000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfba5000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:855b2f8c r4:856ce400 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:855b2f8c r4:856ce400 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84b5c800 r8:856ce42c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856ce400 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856ce400 r8:80278fec r7:dfbe5e60 r6:856ce480 r5:84b5c800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e5fb0 to 0xdf9e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:856c9b40 INFO: task kworker/1:11:4206 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:11 state:D stack:0 pid:4206 tgid:4206 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65250>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a642bc>] (__schedule) from [<81a65250>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:dfc19d84 r9:00000002 r8:60000113 r7:829171a0 r6:dfc19d8c r5:84878000 r4:84878000 [<81a65224>] (schedule) from [<81a65638>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:84878000 r4:8291719c [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67e98>] (__mutex_lock.constprop.0) from [<81a68990>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc19e08 r4:00000000 [<81a6897c>] (__mutex_lock_slowpath) from [<81a689d0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68994>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ebd640 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84878000 r7:00000000 r6:83018600 r5:00001000 r4:7f02f000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:e0055000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:855b3b8c r4:857a9580 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:855b3b8c r4:857a9580 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84878000 r8:857a95ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:857a9580 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:857a9580 r8:80278fec r7:dfbf1e60 r6:857a9500 r5:84878000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc19fb0 to 0xdfc19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85779b80 INFO: task kworker/1:11:4206 is blocked on a mutex likely owned by task kworker/1:43:4405. task:kworker/1:43 state:R running task stack:0 pid:4405 tgid:4405 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65684>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:84b5c800 r8:80200c04 r7:df9e5d54 r6:ffffffff r5:84b5c800 r4:00000000 [<81a65644>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdf9e5d20 to 0xdf9e5d68) 5d20: c8252000 eba7b000 00000001 80239bf8 7f027000 00000001 82acb1c4 82aca5a0 5d40: 7f027000 eba7b000 8280c9b4 df9e5d9c df9e5da0 df9e5d70 80230af0 80239c10 5d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9e5dc0 r5:df9e5e08 r4:df9e5dc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85874800 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84b5c800 r7:00000000 r6:83018600 r5:00001000 r4:7f029000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfba5000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:855b2f8c r4:856ce400 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:855b2f8c r4:856ce400 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84b5c800 r8:856ce42c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856ce400 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856ce400 r8:80278fec r7:dfbe5e60 r6:856ce480 r5:84b5c800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e5fb0 to 0xdf9e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:856c9b40 INFO: task kworker/1:39:4326 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:39 state:D stack:0 pid:4326 tgid:4326 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65250>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a642bc>] (__schedule) from [<81a65250>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:dfbe5d84 r9:00000002 r8:60000013 r7:829171a0 r6:dfbe5d8c r5:84890000 r4:84890000 [<81a65224>] (schedule) from [<81a65638>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:84890000 r4:8291719c [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67e98>] (__mutex_lock.constprop.0) from [<81a68990>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbe5e08 r4:00000000 [<81a6897c>] (__mutex_lock_slowpath) from [<81a689d0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68994>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85694900 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84890000 r7:00000000 r6:83018600 r5:00001000 r4:7f029000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfa81000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85472f8c r4:856c4d80 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:85472f8c r4:856c4d80 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84890000 r8:856c4dac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856c4d80 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856c4d80 r8:80278fec r7:dfbe1e60 r6:856bd180 r5:84890000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbe5fb0 to 0xdfbe5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:8555e0c0 INFO: task kworker/1:39:4326 is blocked on a mutex likely owned by task kworker/1:43:4405. task:kworker/1:43 state:R running task stack:0 pid:4405 tgid:4405 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65684>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:84b5c800 r8:80200c04 r7:df9e5d54 r6:ffffffff r5:84b5c800 r4:00000000 [<81a65644>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdf9e5d20 to 0xdf9e5d68) 5d20: c8252000 eba7b000 00000001 80239bf8 7f027000 00000001 82acb1c4 82aca5a0 5d40: 7f027000 eba7b000 8280c9b4 df9e5d9c df9e5da0 df9e5d70 80230af0 80239c10 5d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9e5dc0 r5:df9e5e08 r4:df9e5dc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85874800 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84b5c800 r7:00000000 r6:83018600 r5:00001000 r4:7f029000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfba5000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:855b2f8c r4:856ce400 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:855b2f8c r4:856ce400 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84b5c800 r8:856ce42c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856ce400 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856ce400 r8:80278fec r7:dfbe5e60 r6:856ce480 r5:84b5c800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e5fb0 to 0xdf9e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:856c9b40 INFO: task kworker/1:40:4328 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:40 state:D stack:0 pid:4328 tgid:4328 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65250>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a642bc>] (__schedule) from [<81a65250>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:df9e1d84 r9:00000002 r8:60000113 r7:829171a0 r6:df9e1d8c r5:84b58000 r4:84b58000 [<81a65224>] (schedule) from [<81a65638>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:84b58000 r4:8291719c [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67e98>] (__mutex_lock.constprop.0) from [<81a68990>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9e1e08 r4:00000000 [<81a6897c>] (__mutex_lock_slowpath) from [<81a689d0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68994>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85624580 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84b58000 r7:00000000 r6:83018600 r5:00001000 r4:7f04b000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea6a5000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84f3838c r4:856c4e00 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84f3838c r4:856c4e00 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84b58000 r8:856c4e2c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856c4e00 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856c4e00 r8:80278fec r7:dfbe1e60 r6:856c4f00 r5:84b58000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e1fb0 to 0xdf9e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:8555e0c0 INFO: task kworker/1:40:4328 is blocked on a mutex likely owned by task kworker/1:43:4405. task:kworker/1:43 state:R running task stack:0 pid:4405 tgid:4405 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65684>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:84b5c800 r8:80200c04 r7:df9e5d54 r6:ffffffff r5:84b5c800 r4:00000000 [<81a65644>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdf9e5d20 to 0xdf9e5d68) 5d20: c8252000 eba7b000 00000001 80239bf8 7f027000 00000001 82acb1c4 82aca5a0 5d40: 7f027000 eba7b000 8280c9b4 df9e5d9c df9e5da0 df9e5d70 80230af0 80239c10 5d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9e5dc0 r5:df9e5e08 r4:df9e5dc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85874800 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84b5c800 r7:00000000 r6:83018600 r5:00001000 r4:7f029000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfba5000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:855b2f8c r4:856ce400 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:855b2f8c r4:856ce400 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84b5c800 r8:856ce42c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856ce400 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856ce400 r8:80278fec r7:dfbe5e60 r6:856ce480 r5:84b5c800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e5fb0 to 0xdf9e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:856c9b40 INFO: task kworker/1:41:4400 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:41 state:D stack:0 pid:4400 tgid:4400 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65250>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a642bc>] (__schedule) from [<81a65250>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:e003dd84 r9:00000002 r8:60000013 r7:829171a0 r6:e003dd8c r5:856d6c00 r4:856d6c00 [<81a65224>] (schedule) from [<81a65638>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:856d6c00 r4:8291719c [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67e98>] (__mutex_lock.constprop.0) from [<81a68990>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e003de08 r4:00000000 [<81a6897c>] (__mutex_lock_slowpath) from [<81a689d0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68994>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85619d40 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:856d6c00 r7:00000000 r6:83018600 r5:00001000 r4:7f041000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea5a3000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85470b8c r4:856ce180 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:85470b8c r4:856ce180 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:856d6c00 r8:856ce1ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856ce180 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856ce180 r8:80278fec r7:dfbe5e60 r6:85414400 r5:856d6c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe003dfb0 to 0xe003dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85416a00 INFO: task kworker/1:41:4400 is blocked on a mutex likely owned by task kworker/1:43:4405. task:kworker/1:43 state:R running task stack:0 pid:4405 tgid:4405 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65684>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:84b5c800 r8:80200c04 r7:df9e5d54 r6:ffffffff r5:84b5c800 r4:00000000 [<81a65644>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdf9e5d20 to 0xdf9e5d68) 5d20: c8252000 eba7b000 00000001 80239bf8 7f027000 00000001 82acb1c4 82aca5a0 5d40: 7f027000 eba7b000 8280c9b4 df9e5d9c df9e5da0 df9e5d70 80230af0 80239c10 5d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9e5dc0 r5:df9e5e08 r4:df9e5dc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85874800 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84b5c800 r7:00000000 r6:83018600 r5:00001000 r4:7f029000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfba5000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:855b2f8c r4:856ce400 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:855b2f8c r4:856ce400 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84b5c800 r8:856ce42c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856ce400 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856ce400 r8:80278fec r7:dfbe5e60 r6:856ce480 r5:84b5c800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e5fb0 to 0xdf9e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:856c9b40 INFO: task kworker/1:42:4402 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:42 state:D stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65250>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a642bc>] (__schedule) from [<81a65250>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:e00edd84 r9:00000002 r8:60000013 r7:829171a0 r6:e00edd8c r5:84f11800 r4:84f11800 [<81a65224>] (schedule) from [<81a65638>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:84f11800 r4:8291719c [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67e98>] (__mutex_lock.constprop.0) from [<81a68990>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00ede08 r4:00000000 [<81a6897c>] (__mutex_lock_slowpath) from [<81a689d0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68994>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85619300 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84f11800 r7:00000000 r6:83018600 r5:00001000 r4:7f033000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea4f9000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:858f578c r4:856ce380 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:858f578c r4:856ce380 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84f11800 r8:856ce3ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856ce380 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856ce380 r8:80278fec r7:e003de60 r6:85414480 r5:84f11800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00edfb0 to 0xe00edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85416880 INFO: task kworker/1:42:4402 is blocked on a mutex likely owned by task kworker/1:43:4405. task:kworker/1:43 state:R running task stack:0 pid:4405 tgid:4405 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65684>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:84b5c800 r8:80200c04 r7:df9e5d54 r6:ffffffff r5:84b5c800 r4:00000000 [<81a65644>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdf9e5d20 to 0xdf9e5d68) 5d20: c8252000 eba7b000 00000001 80239bf8 7f027000 00000001 82acb1c4 82aca5a0 5d40: 7f027000 eba7b000 8280c9b4 df9e5d9c df9e5da0 df9e5d70 80230af0 80239c10 5d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9e5dc0 r5:df9e5e08 r4:df9e5dc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85874800 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84b5c800 r7:00000000 r6:83018600 r5:00001000 r4:7f029000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfba5000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:855b2f8c r4:856ce400 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:855b2f8c r4:856ce400 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84b5c800 r8:856ce42c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856ce400 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856ce400 r8:80278fec r7:dfbe5e60 r6:856ce480 r5:84b5c800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e5fb0 to 0xdf9e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:856c9b40 INFO: task kworker/1:44:4420 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:44 state:D stack:0 pid:4420 tgid:4420 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65250>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a642bc>] (__schedule) from [<81a65250>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:dfb45d84 r9:00000002 r8:60000013 r7:829171a0 r6:dfb45d8c r5:85765400 r4:85765400 [<81a65224>] (schedule) from [<81a65638>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:85765400 r4:8291719c [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67e98>] (__mutex_lock.constprop.0) from [<81a68990>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb45e08 r4:00000000 [<81a6897c>] (__mutex_lock_slowpath) from [<81a689d0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68994>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85410f00 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:85765400 r7:00000000 r6:83018600 r5:00001000 r4:7f02f000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dffe7000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:8547378c r4:856ce580 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:8547378c r4:856ce580 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85765400 r8:856ce5ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856ce580 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856ce580 r8:80278fec r7:df9e5e60 r6:85414c00 r5:85765400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb45fb0 to 0xdfb45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:84ebb3c0 INFO: task kworker/1:44:4420 is blocked on a mutex likely owned by task kworker/1:43:4405. task:kworker/1:43 state:R running task stack:0 pid:4405 tgid:4405 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65684>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:84b5c800 r8:80200c04 r7:df9e5d54 r6:ffffffff r5:84b5c800 r4:00000000 [<81a65644>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdf9e5d20 to 0xdf9e5d68) 5d20: c8252000 eba7b000 00000001 80239bf8 7f027000 00000001 82acb1c4 82aca5a0 5d40: 7f027000 eba7b000 8280c9b4 df9e5d9c df9e5da0 df9e5d70 80230af0 80239c10 5d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9e5dc0 r5:df9e5e08 r4:df9e5dc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85874800 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84b5c800 r7:00000000 r6:83018600 r5:00001000 r4:7f029000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfba5000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:855b2f8c r4:856ce400 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:855b2f8c r4:856ce400 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84b5c800 r8:856ce42c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856ce400 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856ce400 r8:80278fec r7:dfbe5e60 r6:856ce480 r5:84b5c800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e5fb0 to 0xdf9e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:856c9b40 INFO: task kworker/1:45:4422 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:45 state:D stack:0 pid:4422 tgid:4422 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65250>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a642bc>] (__schedule) from [<81a65250>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:dfb55d84 r9:00000002 r8:60000113 r7:829171a0 r6:dfb55d8c r5:85766000 r4:85766000 [<81a65224>] (schedule) from [<81a65638>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:85766000 r4:8291719c [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67e98>] (__mutex_lock.constprop.0) from [<81a68990>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb55e08 r4:00000000 [<81a6897c>] (__mutex_lock_slowpath) from [<81a689d0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68994>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85872c00 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:85766000 r7:00000000 r6:83018600 r5:00001000 r4:7f00f000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:df95f000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85472b8c r4:856ce600 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:85472b8c r4:856ce600 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85766000 r8:856ce62c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856ce600 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856ce600 r8:80278fec r7:df9e5e60 r6:85414c80 r5:85766000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb55fb0 to 0xdfb55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:8540a940 INFO: task kworker/1:45:4422 is blocked on a mutex likely owned by task kworker/1:43:4405. task:kworker/1:43 state:R running task stack:0 pid:4405 tgid:4405 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65684>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:84b5c800 r8:80200c04 r7:df9e5d54 r6:ffffffff r5:84b5c800 r4:00000000 [<81a65644>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdf9e5d20 to 0xdf9e5d68) 5d20: c8252000 eba7b000 00000001 80239bf8 7f027000 00000001 82acb1c4 82aca5a0 5d40: 7f027000 eba7b000 8280c9b4 df9e5d9c df9e5da0 df9e5d70 80230af0 80239c10 5d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9e5dc0 r5:df9e5e08 r4:df9e5dc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85874800 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84b5c800 r7:00000000 r6:83018600 r5:00001000 r4:7f029000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfba5000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:855b2f8c r4:856ce400 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:855b2f8c r4:856ce400 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84b5c800 r8:856ce42c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856ce400 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856ce400 r8:80278fec r7:dfbe5e60 r6:856ce480 r5:84b5c800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e5fb0 to 0xdf9e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:856c9b40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:46:4426 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:46 state:D stack:0 pid:4426 tgid:4426 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65250>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a642bc>] (__schedule) from [<81a65250>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:e0031d84 r9:00000002 r8:60000113 r7:829171a0 r6:e0031d8c r5:85763000 r4:85763000 [<81a65224>] (schedule) from [<81a65638>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:85763000 r4:8291719c [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67e98>] (__mutex_lock.constprop.0) from [<81a68990>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0031e08 r4:00000000 [<81a6897c>] (__mutex_lock_slowpath) from [<81a689d0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68994>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857dd940 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:85763000 r7:00000000 r6:83018600 r5:00001000 r4:7f02d000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfc4f000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:854cbf8c r4:856ce700 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:854cbf8c r4:856ce700 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85763000 r8:856ce72c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856ce700 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856ce700 r8:80278fec r7:dfb55e60 r6:85414e00 r5:85763000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0031fb0 to 0xe0031ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85415340 INFO: task kworker/1:46:4426 is blocked on a mutex likely owned by task kworker/1:43:4405. task:kworker/1:43 state:R running task stack:0 pid:4405 tgid:4405 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65684>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:84b5c800 r8:80200c04 r7:df9e5d54 r6:ffffffff r5:84b5c800 r4:00000000 [<81a65644>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdf9e5d20 to 0xdf9e5d68) 5d20: c8252000 eba7b000 00000001 80239bf8 7f027000 00000001 82acb1c4 82aca5a0 5d40: 7f027000 eba7b000 8280c9b4 df9e5d9c df9e5da0 df9e5d70 80230af0 80239c10 5d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9e5dc0 r5:df9e5e08 r4:df9e5dc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85874800 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84b5c800 r7:00000000 r6:83018600 r5:00001000 r4:7f029000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfba5000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:855b2f8c r4:856ce400 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:855b2f8c r4:856ce400 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84b5c800 r8:856ce42c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856ce400 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856ce400 r8:80278fec r7:dfbe5e60 r6:856ce480 r5:84b5c800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e5fb0 to 0xdf9e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:856c9b40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:47:4429 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:47 state:D stack:0 pid:4429 tgid:4429 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65250>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a642bc>] (__schedule) from [<81a65250>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:dfc35d84 r9:00000002 r8:60000113 r7:829171a0 r6:dfc35d8c r5:84f18c00 r4:84f18c00 [<81a65224>] (schedule) from [<81a65638>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:84f18c00 r4:8291719c [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67e98>] (__mutex_lock.constprop.0) from [<81a68990>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc35e08 r4:00000000 [<81a6897c>] (__mutex_lock_slowpath) from [<81a689d0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68994>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856b1580 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84f18c00 r7:00000000 r6:83018600 r5:00001000 r4:7f02b000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfbe7000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:8547178c r4:856ce780 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:8547178c r4:856ce780 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84f18c00 r8:856ce7ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856ce780 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856ce780 r8:80278fec r7:dfb55e60 r6:8540c080 r5:84f18c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc35fb0 to 0xdfc35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:857b3240 INFO: task kworker/1:47:4429 is blocked on a mutex likely owned by task kworker/1:43:4405. task:kworker/1:43 state:R running task stack:0 pid:4405 tgid:4405 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65684>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:84b5c800 r8:80200c04 r7:df9e5d54 r6:ffffffff r5:84b5c800 r4:00000000 [<81a65644>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdf9e5d20 to 0xdf9e5d68) 5d20: c8252000 eba7b000 00000001 80239bf8 7f027000 00000001 82acb1c4 82aca5a0 5d40: 7f027000 eba7b000 8280c9b4 df9e5d9c df9e5da0 df9e5d70 80230af0 80239c10 5d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9e5dc0 r5:df9e5e08 r4:df9e5dc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85874800 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84b5c800 r7:00000000 r6:83018600 r5:00001000 r4:7f029000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfba5000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:855b2f8c r4:856ce400 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:855b2f8c r4:856ce400 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84b5c800 r8:856ce42c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856ce400 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856ce400 r8:80278fec r7:dfbe5e60 r6:856ce480 r5:84b5c800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e5fb0 to 0xdf9e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:856c9b40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:48:4431 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:48 state:D stack:0 pid:4431 tgid:4431 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65250>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a642bc>] (__schedule) from [<81a65250>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:e0119d84 r9:00000002 r8:60000113 r7:829171a0 r6:e0119d8c r5:84f19800 r4:84f19800 [<81a65224>] (schedule) from [<81a65638>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:84f19800 r4:8291719c [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67e98>] (__mutex_lock.constprop.0) from [<81a68990>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0119e08 r4:00000000 [<81a6897c>] (__mutex_lock_slowpath) from [<81a689d0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68994>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85694000 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84f19800 r7:00000000 r6:83018600 r5:00001000 r4:7f045000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea7d9000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85471f8c r4:856ce800 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:85471f8c r4:856ce800 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84f19800 r8:856ce82c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856ce800 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856ce800 r8:80278fec r7:dfb55e60 r6:8540c100 r5:84f19800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0119fb0 to 0xe0119ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:857d9f00 INFO: task kworker/1:48:4431 is blocked on a mutex likely owned by task kworker/1:43:4405. task:kworker/1:43 state:R running task stack:0 pid:4405 tgid:4405 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65684>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:84b5c800 r8:80200c04 r7:df9e5d54 r6:ffffffff r5:84b5c800 r4:00000000 [<81a65644>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdf9e5d20 to 0xdf9e5d68) 5d20: c8252000 eba7b000 00000001 80239bf8 7f027000 00000001 82acb1c4 82aca5a0 5d40: 7f027000 eba7b000 8280c9b4 df9e5d9c df9e5da0 df9e5d70 80230af0 80239c10 5d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9e5dc0 r5:df9e5e08 r4:df9e5dc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85874800 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84b5c800 r7:00000000 r6:83018600 r5:00001000 r4:7f029000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfba5000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:855b2f8c r4:856ce400 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:855b2f8c r4:856ce400 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84b5c800 r8:856ce42c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856ce400 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856ce400 r8:80278fec r7:dfbe5e60 r6:856ce480 r5:84b5c800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e5fb0 to 0xdf9e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:856c9b40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:49:4433 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:49 state:D stack:0 pid:4433 tgid:4433 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65250>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a642bc>] (__schedule) from [<81a65250>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:e0165d84 r9:00000002 r8:60000113 r7:829171a0 r6:e0165d8c r5:84b5ec00 r4:84b5ec00 [<81a65224>] (schedule) from [<81a65638>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:84b5ec00 r4:8291719c [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67e98>] (__mutex_lock.constprop.0) from [<81a68990>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0165e08 r4:00000000 [<81a6897c>] (__mutex_lock_slowpath) from [<81a689d0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68994>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85779a80 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84b5ec00 r7:00000000 r6:83018600 r5:00001000 r4:7f039000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:e4239000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84f24f8c r4:856ce880 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84f24f8c r4:856ce880 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84b5ec00 r8:856ce8ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856ce880 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856ce880 r8:80278fec r7:dfb55e60 r6:856ce900 r5:84b5ec00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0165fb0 to 0xe0165ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:856c8000 INFO: task kworker/1:49:4433 is blocked on a mutex likely owned by task kworker/1:43:4405. task:kworker/1:43 state:R running task stack:0 pid:4405 tgid:4405 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65684>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:84b5c800 r8:80200c04 r7:df9e5d54 r6:ffffffff r5:84b5c800 r4:00000000 [<81a65644>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdf9e5d20 to 0xdf9e5d68) 5d20: c8252000 eba7b000 00000001 80239bf8 7f027000 00000001 82acb1c4 82aca5a0 5d40: 7f027000 eba7b000 8280c9b4 df9e5d9c df9e5da0 df9e5d70 80230af0 80239c10 5d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9e5dc0 r5:df9e5e08 r4:df9e5dc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85874800 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84b5c800 r7:00000000 r6:83018600 r5:00001000 r4:7f029000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfba5000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:855b2f8c r4:856ce400 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:855b2f8c r4:856ce400 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84b5c800 r8:856ce42c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856ce400 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856ce400 r8:80278fec r7:dfbe5e60 r6:856ce480 r5:84b5c800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e5fb0 to 0xdf9e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:856c9b40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:50:4434 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:50 state:D stack:0 pid:4434 tgid:4434 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65250>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a642bc>] (__schedule) from [<81a65250>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:e016dd84 r9:00000002 r8:60000013 r7:829171a0 r6:e016dd8c r5:84b5b000 r4:84b5b000 [<81a65224>] (schedule) from [<81a65638>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:84b5b000 r4:8291719c [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67e98>] (__mutex_lock.constprop.0) from [<81a68990>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e016de08 r4:00000000 [<81a6897c>] (__mutex_lock_slowpath) from [<81a689d0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68994>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555c140 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84b5b000 r7:00000000 r6:83018600 r5:00001000 r4:7f049000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea977000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:8547278c r4:856ce980 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:8547278c r4:856ce980 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84b5b000 r8:856ce9ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856ce980 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856ce980 r8:80278fec r7:e0165e60 r6:856cea00 r5:84b5b000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe016dfb0 to 0xe016dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:856c8000 INFO: task kworker/1:50:4434 is blocked on a mutex likely owned by task kworker/1:43:4405. task:kworker/1:43 state:R running task stack:0 pid:4405 tgid:4405 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65684>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:84b5c800 r8:80200c04 r7:df9e5d54 r6:ffffffff r5:84b5c800 r4:00000000 [<81a65644>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdf9e5d20 to 0xdf9e5d68) 5d20: c8252000 eba7b000 00000001 80239bf8 7f027000 00000001 82acb1c4 82aca5a0 5d40: 7f027000 eba7b000 8280c9b4 df9e5d9c df9e5da0 df9e5d70 80230af0 80239c10 5d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9e5dc0 r5:df9e5e08 r4:df9e5dc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85874800 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84b5c800 r7:00000000 r6:83018600 r5:00001000 r4:7f029000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfba5000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:855b2f8c r4:856ce400 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:855b2f8c r4:856ce400 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84b5c800 r8:856ce42c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856ce400 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856ce400 r8:80278fec r7:dfbe5e60 r6:856ce480 r5:84b5c800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e5fb0 to 0xdf9e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:856c9b40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:51:4437 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:51 state:D stack:0 pid:4437 tgid:4437 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65250>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a642bc>] (__schedule) from [<81a65250>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:e00f5d84 r9:00000002 r8:60000113 r7:829171a0 r6:e00f5d8c r5:84b5bc00 r4:84b5bc00 [<81a65224>] (schedule) from [<81a65638>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:84b5bc00 r4:8291719c [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67e98>] (__mutex_lock.constprop.0) from [<81a68990>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00f5e08 r4:00000000 [<81a6897c>] (__mutex_lock_slowpath) from [<81a689d0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68994>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8541b580 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84b5bc00 r7:00000000 r6:83018600 r5:00001000 r4:7f043000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea751000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85471b8c r4:856cea80 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:85471b8c r4:856cea80 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84b5bc00 r8:856ceaac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856cea80 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856cea80 r8:80278fec r7:e0165e60 r6:856ceb00 r5:84b5bc00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00f5fb0 to 0xe00f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:856c8700 INFO: task kworker/1:51:4437 is blocked on a mutex likely owned by task kworker/1:43:4405. task:kworker/1:43 state:R running task stack:0 pid:4405 tgid:4405 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65684>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:84b5c800 r8:80200c04 r7:df9e5d54 r6:ffffffff r5:84b5c800 r4:00000000 [<81a65644>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdf9e5d20 to 0xdf9e5d68) 5d20: c8252000 eba7b000 00000001 80239bf8 7f027000 00000001 82acb1c4 82aca5a0 5d40: 7f027000 eba7b000 8280c9b4 df9e5d9c df9e5da0 df9e5d70 80230af0 80239c10 5d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9e5dc0 r5:df9e5e08 r4:df9e5dc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85874800 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84b5c800 r7:00000000 r6:83018600 r5:00001000 r4:7f029000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfba5000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:855b2f8c r4:856ce400 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:855b2f8c r4:856ce400 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84b5c800 r8:856ce42c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856ce400 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856ce400 r8:80278fec r7:dfbe5e60 r6:856ce480 r5:84b5c800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e5fb0 to 0xdf9e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:856c9b40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:52:4439 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:52 state:D stack:0 pid:4439 tgid:4439 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65250>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a642bc>] (__schedule) from [<81a65250>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:e0195d84 r9:00000002 r8:60000013 r7:829171a0 r6:e0195d8c r5:84b5d400 r4:84b5d400 [<81a65224>] (schedule) from [<81a65638>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:84b5d400 r4:8291719c [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67e98>] (__mutex_lock.constprop.0) from [<81a68990>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0195e08 r4:00000000 [<81a6897c>] (__mutex_lock_slowpath) from [<81a689d0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68994>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857b8700 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84b5d400 r7:00000000 r6:83018600 r5:00001000 r4:7f047000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea8cd000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:8547238c r4:856ceb80 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:8547238c r4:856ceb80 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84b5d400 r8:856cebac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856ceb80 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856ceb80 r8:80278fec r7:e0165e60 r6:856cec00 r5:84b5d400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0195fb0 to 0xe0195ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:856c8b80 INFO: task kworker/1:52:4439 is blocked on a mutex likely owned by task kworker/1:43:4405. task:kworker/1:43 state:R running task stack:0 pid:4405 tgid:4405 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65684>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:84b5c800 r8:80200c04 r7:df9e5d54 r6:ffffffff r5:84b5c800 r4:00000000 [<81a65644>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdf9e5d20 to 0xdf9e5d68) 5d20: c8252000 eba7b000 00000001 80239bf8 7f027000 00000001 82acb1c4 82aca5a0 5d40: 7f027000 eba7b000 8280c9b4 df9e5d9c df9e5da0 df9e5d70 80230af0 80239c10 5d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9e5dc0 r5:df9e5e08 r4:df9e5dc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85874800 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84b5c800 r7:00000000 r6:83018600 r5:00001000 r4:7f029000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfba5000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:855b2f8c r4:856ce400 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:855b2f8c r4:856ce400 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84b5c800 r8:856ce42c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856ce400 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856ce400 r8:80278fec r7:dfbe5e60 r6:856ce480 r5:84b5c800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e5fb0 to 0xdf9e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:856c9b40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:53:4442 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:53 state:D stack:0 pid:4442 tgid:4442 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65250>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a642bc>] (__schedule) from [<81a65250>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:e0199d84 r9:00000002 r8:60000013 r7:829171a0 r6:e0199d8c r5:84b5e000 r4:84b5e000 [<81a65224>] (schedule) from [<81a65638>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:84b5e000 r4:8291719c [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67e98>] (__mutex_lock.constprop.0) from [<81a68990>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0199e08 r4:00000000 [<81a6897c>] (__mutex_lock_slowpath) from [<81a689d0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68994>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85430a80 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84b5e000 r7:00000000 r6:83018600 r5:00001000 r4:7f031000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:e4205000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:855b3f8c r4:856cec80 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:855b3f8c r4:856cec80 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84b5e000 r8:856cecac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856cec80 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856cec80 r8:80278fec r7:e0165e60 r6:856ced00 r5:84b5e000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0199fb0 to 0xe0199ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:856c8f00 INFO: task kworker/1:53:4442 is blocked on a mutex likely owned by task kworker/1:43:4405. task:kworker/1:43 state:R running task stack:0 pid:4405 tgid:4405 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65684>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:84b5c800 r8:80200c04 r7:df9e5d54 r6:ffffffff r5:84b5c800 r4:00000000 [<81a65644>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdf9e5d20 to 0xdf9e5d68) 5d20: c8252000 eba7b000 00000001 80239bf8 7f027000 00000001 82acb1c4 82aca5a0 5d40: 7f027000 eba7b000 8280c9b4 df9e5d9c df9e5da0 df9e5d70 80230af0 80239c10 5d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9e5dc0 r5:df9e5e08 r4:df9e5dc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85874800 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84b5c800 r7:00000000 r6:83018600 r5:00001000 r4:7f029000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfba5000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:855b2f8c r4:856ce400 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:855b2f8c r4:856ce400 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84b5c800 r8:856ce42c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856ce400 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856ce400 r8:80278fec r7:dfbe5e60 r6:856ce480 r5:84b5c800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e5fb0 to 0xdf9e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:856c9b40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:54:4443 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:54 state:D stack:0 pid:4443 tgid:4443 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65250>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a642bc>] (__schedule) from [<81a65250>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:e0185d84 r9:00000002 r8:60000013 r7:829171a0 r6:e0185d8c r5:84870000 r4:84870000 [<81a65224>] (schedule) from [<81a65638>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:84870000 r4:8291719c [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67e98>] (__mutex_lock.constprop.0) from [<81a68990>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0185e08 r4:00000000 [<81a6897c>] (__mutex_lock_slowpath) from [<81a689d0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68994>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85415880 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84870000 r7:00000000 r6:83018600 r5:00001000 r4:7f03d000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea3eb000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:8547038c r4:856ced80 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:8547038c r4:856ced80 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84870000 r8:856cedac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856ced80 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856ced80 r8:80278fec r7:e0165e60 r6:856cee80 r5:84870000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0185fb0 to 0xe0185ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:856c8f00 INFO: task kworker/1:54:4443 is blocked on a mutex likely owned by task kworker/1:43:4405. task:kworker/1:43 state:R running task stack:0 pid:4405 tgid:4405 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65684>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:84b5c800 r8:80200c04 r7:df9e5d54 r6:ffffffff r5:84b5c800 r4:00000000 [<81a65644>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdf9e5d20 to 0xdf9e5d68) 5d20: c8252000 eba7b000 00000001 80239bf8 7f027000 00000001 82acb1c4 82aca5a0 5d40: 7f027000 eba7b000 8280c9b4 df9e5d9c df9e5da0 df9e5d70 80230af0 80239c10 5d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9e5dc0 r5:df9e5e08 r4:df9e5dc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85874800 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84b5c800 r7:00000000 r6:83018600 r5:00001000 r4:7f029000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfba5000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:855b2f8c r4:856ce400 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:855b2f8c r4:856ce400 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84b5c800 r8:856ce42c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856ce400 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856ce400 r8:80278fec r7:dfbe5e60 r6:856ce480 r5:84b5c800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e5fb0 to 0xdf9e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:856c9b40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:55:4445 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:55 state:D stack:0 pid:4445 tgid:4445 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65250>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a642bc>] (__schedule) from [<81a65250>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:dfa49d84 r9:00000002 r8:60000113 r7:829171a0 r6:dfa49d8c r5:84871800 r4:84871800 [<81a65224>] (schedule) from [<81a65638>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:84871800 r4:8291719c [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67e98>] (__mutex_lock.constprop.0) from [<81a68990>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa49e08 r4:00000000 [<81a6897c>] (__mutex_lock_slowpath) from [<81a689d0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68994>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84eb8c80 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84871800 r7:00000000 r6:83018600 r5:00001000 r4:7f027000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfa3d000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84f2538c r4:856cef00 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84f2538c r4:856cef00 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84871800 r8:856cef2c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856cef00 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856cef00 r8:80278fec r7:e0165e60 r6:856cef80 r5:84871800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa49fb0 to 0xdfa49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:856c8580 INFO: task kworker/1:55:4445 is blocked on a mutex likely owned by task kworker/1:43:4405. task:kworker/1:43 state:R running task stack:0 pid:4405 tgid:4405 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65684>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:84b5c800 r8:80200c04 r7:df9e5d54 r6:ffffffff r5:84b5c800 r4:00000000 [<81a65644>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdf9e5d20 to 0xdf9e5d68) 5d20: c8252000 eba7b000 00000001 80239bf8 7f027000 00000001 82acb1c4 82aca5a0 5d40: 7f027000 eba7b000 8280c9b4 df9e5d9c df9e5da0 df9e5d70 80230af0 80239c10 5d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9e5dc0 r5:df9e5e08 r4:df9e5dc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85874800 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84b5c800 r7:00000000 r6:83018600 r5:00001000 r4:7f029000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfba5000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:855b2f8c r4:856ce400 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:855b2f8c r4:856ce400 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84b5c800 r8:856ce42c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856ce400 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856ce400 r8:80278fec r7:dfbe5e60 r6:856ce480 r5:84b5c800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e5fb0 to 0xdf9e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:856c9b40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:56:4447 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:56 state:D stack:0 pid:4447 tgid:4447 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65250>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a642bc>] (__schedule) from [<81a65250>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:e01d5d84 r9:00000002 r8:60000113 r7:829171a0 r6:e01d5d8c r5:84870c00 r4:84870c00 [<81a65224>] (schedule) from [<81a65638>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:84870c00 r4:8291719c [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67e98>] (__mutex_lock.constprop.0) from [<81a68990>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e01d5e08 r4:00000000 [<81a6897c>] (__mutex_lock_slowpath) from [<81a689d0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68994>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85779480 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84870c00 r7:00000000 r6:83018600 r5:00001000 r4:7f03b000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:e82f1000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:858f7f8c r4:856ce200 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:858f7f8c r4:856ce200 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84870c00 r8:856ce22c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856ce200 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856ce200 r8:80278fec r7:dfa49e60 r6:856ce300 r5:84870c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe01d5fb0 to 0xe01d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:856cb840 INFO: task kworker/1:56:4447 is blocked on a mutex likely owned by task kworker/1:43:4405. task:kworker/1:43 state:R running task stack:0 pid:4405 tgid:4405 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65684>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:84b5c800 r8:80200c04 r7:df9e5d54 r6:ffffffff r5:84b5c800 r4:00000000 [<81a65644>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdf9e5d20 to 0xdf9e5d68) 5d20: c8252000 eba7b000 00000001 80239bf8 7f027000 00000001 82acb1c4 82aca5a0 5d40: 7f027000 eba7b000 8280c9b4 df9e5d9c df9e5da0 df9e5d70 80230af0 80239c10 5d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9e5dc0 r5:df9e5e08 r4:df9e5dc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85874800 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84b5c800 r7:00000000 r6:83018600 r5:00001000 r4:7f029000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfba5000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:855b2f8c r4:856ce400 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:855b2f8c r4:856ce400 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84b5c800 r8:856ce42c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856ce400 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856ce400 r8:80278fec r7:dfbe5e60 r6:856ce480 r5:84b5c800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e5fb0 to 0xdf9e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:856c9b40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:57:4449 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:57 state:D stack:0 pid:4449 tgid:4449 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65250>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a642bc>] (__schedule) from [<81a65250>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:e01d9d84 r9:00000002 r8:60000013 r7:829171a0 r6:e01d9d8c r5:84873000 r4:84873000 [<81a65224>] (schedule) from [<81a65638>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:84873000 r4:8291719c [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67e98>] (__mutex_lock.constprop.0) from [<81a68990>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e01d9e08 r4:00000000 [<81a6897c>] (__mutex_lock_slowpath) from [<81a689d0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68994>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85779100 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84873000 r7:00000000 r6:83018600 r5:00001000 r4:7f037000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:e013b000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:857a0f8c r4:856ce280 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:857a0f8c r4:856ce280 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84873000 r8:856ce2ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856ce280 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856ce280 r8:80278fec r7:dfa49e60 r6:856ce080 r5:84873000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe01d9fb0 to 0xe01d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:8555eb00 INFO: task kworker/1:57:4449 is blocked on a mutex likely owned by task kworker/1:43:4405. task:kworker/1:43 state:R running task stack:0 pid:4405 tgid:4405 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65684>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:84b5c800 r8:80200c04 r7:df9e5d54 r6:ffffffff r5:84b5c800 r4:00000000 [<81a65644>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdf9e5d20 to 0xdf9e5d68) 5d20: c8252000 eba7b000 00000001 80239bf8 7f027000 00000001 82acb1c4 82aca5a0 5d40: 7f027000 eba7b000 8280c9b4 df9e5d9c df9e5da0 df9e5d70 80230af0 80239c10 5d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9e5dc0 r5:df9e5e08 r4:df9e5dc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85874800 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84b5c800 r7:00000000 r6:83018600 r5:00001000 r4:7f029000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfba5000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:855b2f8c r4:856ce400 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:855b2f8c r4:856ce400 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84b5c800 r8:856ce42c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856ce400 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856ce400 r8:80278fec r7:dfbe5e60 r6:856ce480 r5:84b5c800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e5fb0 to 0xdf9e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:856c9b40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:58:4451 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:58 state:D stack:0 pid:4451 tgid:4451 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65250>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a642bc>] (__schedule) from [<81a65250>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:e4209d84 r9:00000002 r8:60000013 r7:829171a0 r6:e4209d8c r5:84873c00 r4:84873c00 [<81a65224>] (schedule) from [<81a65638>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:84873c00 r4:8291719c [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67e98>] (__mutex_lock.constprop.0) from [<81a68990>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4209e08 r4:00000000 [<81a6897c>] (__mutex_lock_slowpath) from [<81a689d0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68994>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85619c80 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84873c00 r7:00000000 r6:83018600 r5:00001000 r4:7f035000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfb11000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:855b0f8c r4:856c4980 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:855b0f8c r4:856c4980 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84873c00 r8:856c49ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856c4980 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856c4980 r8:80278fec r7:dfa49e60 r6:856cd000 r5:84873c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4209fb0 to 0xe4209ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:856c3400 INFO: task kworker/1:58:4451 is blocked on a mutex likely owned by task kworker/1:43:4405. task:kworker/1:43 state:R running task stack:0 pid:4405 tgid:4405 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65684>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:84b5c800 r8:80200c04 r7:df9e5d54 r6:ffffffff r5:84b5c800 r4:00000000 [<81a65644>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdf9e5d20 to 0xdf9e5d68) 5d20: c8252000 eba7b000 00000001 80239bf8 7f027000 00000001 82acb1c4 82aca5a0 5d40: 7f027000 eba7b000 8280c9b4 df9e5d9c df9e5da0 df9e5d70 80230af0 80239c10 5d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9e5dc0 r5:df9e5e08 r4:df9e5dc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85874800 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84b5c800 r7:00000000 r6:83018600 r5:00001000 r4:7f029000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfba5000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:855b2f8c r4:856ce400 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:855b2f8c r4:856ce400 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84b5c800 r8:856ce42c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856ce400 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856ce400 r8:80278fec r7:dfbe5e60 r6:856ce480 r5:84b5c800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e5fb0 to 0xdf9e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:856c9b40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:60:4455 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:60 state:D stack:0 pid:4455 tgid:4455 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65250>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a642bc>] (__schedule) from [<81a65250>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:e4219d84 r9:00000002 r8:60000113 r7:829171a0 r6:e4219d8c r5:84876000 r4:84876000 [<81a65224>] (schedule) from [<81a65638>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:84876000 r4:8291719c [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67e98>] (__mutex_lock.constprop.0) from [<81a68990>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4219e08 r4:00000000 [<81a6897c>] (__mutex_lock_slowpath) from [<81a689d0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68994>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854347c0 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84876000 r7:00000000 r6:83018600 r5:00001000 r4:7f041000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea60f000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:855b178c r4:856cd180 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:855b178c r4:856cd180 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84876000 r8:856cd1ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856cd180 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856cd180 r8:80278fec r7:e4215e60 r6:856cd200 r5:84876000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4219fb0 to 0xe4219ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:857799c0 INFO: task kworker/1:60:4455 is blocked on a mutex likely owned by task kworker/1:43:4405. task:kworker/1:43 state:R running task stack:0 pid:4405 tgid:4405 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65684>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:84b5c800 r8:80200c04 r7:df9e5d54 r6:ffffffff r5:84b5c800 r4:00000000 [<81a65644>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdf9e5d20 to 0xdf9e5d68) 5d20: c8252000 eba7b000 00000001 80239bf8 7f027000 00000001 82acb1c4 82aca5a0 5d40: 7f027000 eba7b000 8280c9b4 df9e5d9c df9e5da0 df9e5d70 80230af0 80239c10 5d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9e5dc0 r5:df9e5e08 r4:df9e5dc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85874800 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84b5c800 r7:00000000 r6:83018600 r5:00001000 r4:7f029000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfba5000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:855b2f8c r4:856ce400 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:855b2f8c r4:856ce400 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84b5c800 r8:856ce42c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856ce400 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856ce400 r8:80278fec r7:dfbe5e60 r6:856ce480 r5:84b5c800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e5fb0 to 0xdf9e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:856c9b40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:176:4923 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:176 state:D stack:0 pid:4923 tgid:4923 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65250>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a642bc>] (__schedule) from [<81a65250>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ea7b1d84 r9:00000002 r8:60000113 r7:829171a0 r6:ea7b1d8c r5:85404800 r4:85404800 [<81a65224>] (schedule) from [<81a65638>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:85404800 r4:8291719c [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67e98>] (__mutex_lock.constprop.0) from [<81a68990>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea7b1e08 r4:00000000 [<81a6897c>] (__mutex_lock_slowpath) from [<81a689d0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68994>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857b75c0 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:85404800 r7:00000000 r6:83018400 r5:00001000 r4:7f033000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea573000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:854c9f8c r4:85443300 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:854c9f8c r4:85443300 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85404800 r8:8544332c r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:85443300 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85443300 r8:80278fec r7:ea811e60 r6:85431400 r5:85404800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea7b1fb0 to 0xea7b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85445ec0 INFO: task kworker/0:176:4923 is blocked on a mutex likely owned by task kworker/1:43:4405. task:kworker/1:43 state:R running task stack:0 pid:4405 tgid:4405 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65684>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:84b5c800 r8:80200c04 r7:df9e5d54 r6:ffffffff r5:84b5c800 r4:00000000 [<81a65644>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdf9e5d20 to 0xdf9e5d68) 5d20: c8252000 eba7b000 00000001 80239bf8 7f027000 00000001 82acb1c4 82aca5a0 5d40: 7f027000 eba7b000 8280c9b4 df9e5d9c df9e5da0 df9e5d70 80230af0 80239c10 5d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9e5dc0 r5:df9e5e08 r4:df9e5dc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85874800 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84b5c800 r7:00000000 r6:83018600 r5:00001000 r4:7f029000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfba5000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:855b2f8c r4:856ce400 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:855b2f8c r4:856ce400 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84b5c800 r8:856ce42c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856ce400 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856ce400 r8:80278fec r7:dfbe5e60 r6:856ce480 r5:84b5c800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e5fb0 to 0xdf9e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:856c9b40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:213:5062 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:213 state:D stack:0 pid:5062 tgid:5062 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65250>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a642bc>] (__schedule) from [<81a65250>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ea985d84 r9:00000002 r8:60000113 r7:829171a0 r6:ea985d8c r5:85926000 r4:85926000 [<81a65224>] (schedule) from [<81a65638>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:85926000 r4:8291719c [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67e98>] (__mutex_lock.constprop.0) from [<81a68990>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea985e08 r4:00000000 [<81a6897c>] (__mutex_lock_slowpath) from [<81a689d0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68994>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d8d080 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:85926000 r7:00000000 r6:83018400 r5:00001000 r4:7f02d000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfc89000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:854c9b8c r4:85563b80 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:854c9b8c r4:85563b80 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85926000 r8:85563bac r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:85563b80 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85563b80 r8:80278fec r7:ea981e60 r6:85563c00 r5:85926000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea985fb0 to 0xea985ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:854364c0 INFO: task kworker/0:213:5062 is blocked on a mutex likely owned by task kworker/1:43:4405. task:kworker/1:43 state:R running task stack:0 pid:4405 tgid:4405 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65684>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:84b5c800 r8:80200c04 r7:df9e5d54 r6:ffffffff r5:84b5c800 r4:00000000 [<81a65644>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdf9e5d20 to 0xdf9e5d68) 5d20: c8252000 eba7b000 00000001 80239bf8 7f027000 00000001 82acb1c4 82aca5a0 5d40: 7f027000 eba7b000 8280c9b4 df9e5d9c df9e5da0 df9e5d70 80230af0 80239c10 5d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9e5dc0 r5:df9e5e08 r4:df9e5dc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85874800 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84b5c800 r7:00000000 r6:83018600 r5:00001000 r4:7f029000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfba5000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:855b2f8c r4:856ce400 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:855b2f8c r4:856ce400 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84b5c800 r8:856ce42c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856ce400 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856ce400 r8:80278fec r7:dfbe5e60 r6:856ce480 r5:84b5c800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e5fb0 to 0xdf9e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:856c9b40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:226:5100 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:226 state:D stack:0 pid:5100 tgid:5100 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65250>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a642bc>] (__schedule) from [<81a65250>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ea9d1d84 r9:00000002 r8:60000113 r7:829171a0 r6:ea9d1d8c r5:858b8000 r4:858b8000 [<81a65224>] (schedule) from [<81a65638>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:858b8000 r4:8291719c [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67e98>] (__mutex_lock.constprop.0) from [<81a68990>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9d1e08 r4:00000000 [<81a6897c>] (__mutex_lock_slowpath) from [<81a689d0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68994>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84eaea80 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:858b8000 r7:00000000 r6:83018400 r5:00001000 r4:7f03f000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea6a1000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:854cb78c r4:85879a80 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:854cb78c r4:85879a80 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:858b8000 r8:85879aac r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:85879a80 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85879a80 r8:80278fec r7:ea971e60 r6:85879b80 r5:858b8000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9d1fb0 to 0xea9d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:858374c0 INFO: task kworker/0:226:5100 is blocked on a mutex likely owned by task kworker/1:43:4405. task:kworker/1:43 state:R running task stack:0 pid:4405 tgid:4405 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65684>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:84b5c800 r8:80200c04 r7:df9e5d54 r6:ffffffff r5:84b5c800 r4:00000000 [<81a65644>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdf9e5d20 to 0xdf9e5d68) 5d20: c8252000 eba7b000 00000001 80239bf8 7f027000 00000001 82acb1c4 82aca5a0 5d40: 7f027000 eba7b000 8280c9b4 df9e5d9c df9e5da0 df9e5d70 80230af0 80239c10 5d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9e5dc0 r5:df9e5e08 r4:df9e5dc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85874800 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84b5c800 r7:00000000 r6:83018600 r5:00001000 r4:7f029000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfba5000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:855b2f8c r4:856ce400 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:855b2f8c r4:856ce400 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84b5c800 r8:856ce42c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856ce400 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856ce400 r8:80278fec r7:dfbe5e60 r6:856ce480 r5:84b5c800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e5fb0 to 0xdf9e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:856c9b40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:230:5107 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:230 state:D stack:0 pid:5107 tgid:5107 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65250>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a642bc>] (__schedule) from [<81a65250>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ea9c1d84 r9:00000002 r8:60000113 r7:829171a0 r6:ea9c1d8c r5:858bbc00 r4:858bbc00 [<81a65224>] (schedule) from [<81a65638>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:858bbc00 r4:8291719c [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67e98>] (__mutex_lock.constprop.0) from [<81a68990>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9c1e08 r4:00000000 [<81a6897c>] (__mutex_lock_slowpath) from [<81a689d0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68994>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d89380 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:858bbc00 r7:00000000 r6:83018400 r5:00001000 r4:7f02b000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfc2f000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:854c978c r4:85879f00 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:854c978c r4:85879f00 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:858bbc00 r8:85879f2c r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:85879f00 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85879f00 r8:80278fec r7:ea9c5e60 r6:85879f80 r5:858bbc00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9c1fb0 to 0xea9c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85880ac0 INFO: task kworker/0:230:5107 is blocked on a mutex likely owned by task kworker/1:43:4405. task:kworker/1:43 state:R running task stack:0 pid:4405 tgid:4405 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65684>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:84b5c800 r8:80200c04 r7:df9e5d54 r6:ffffffff r5:84b5c800 r4:00000000 [<81a65644>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdf9e5d20 to 0xdf9e5d68) 5d20: c8252000 eba7b000 00000001 80239bf8 7f027000 00000001 82acb1c4 82aca5a0 5d40: 7f027000 eba7b000 8280c9b4 df9e5d9c df9e5da0 df9e5d70 80230af0 80239c10 5d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9e5dc0 r5:df9e5e08 r4:df9e5dc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85874800 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84b5c800 r7:00000000 r6:83018600 r5:00001000 r4:7f029000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfba5000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:855b2f8c r4:856ce400 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:855b2f8c r4:856ce400 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84b5c800 r8:856ce42c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856ce400 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856ce400 r8:80278fec r7:dfbe5e60 r6:856ce480 r5:84b5c800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e5fb0 to 0xdf9e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:856c9b40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:233:5113 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:233 state:D stack:0 pid:5113 tgid:5113 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65250>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a642bc>] (__schedule) from [<81a65250>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:eaa01d84 r9:00000002 r8:60000113 r7:829171a0 r6:eaa01d8c r5:858bd400 r4:858bd400 [<81a65224>] (schedule) from [<81a65638>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:858bd400 r4:8291719c [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67e98>] (__mutex_lock.constprop.0) from [<81a68990>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa01e08 r4:00000000 [<81a6897c>] (__mutex_lock_slowpath) from [<81a689d0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68994>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8543ad80 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:858bd400 r7:00000000 r6:83018400 r5:00001000 r4:7f037000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:e010d000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:854ca38c r4:8587e280 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:854ca38c r4:8587e280 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:858bd400 r8:8587e2ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:8587e280 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8587e280 r8:80278fec r7:ea9fde60 r6:8587e300 r5:858bd400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa01fb0 to 0xeaa01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85439d00 INFO: task kworker/0:233:5113 is blocked on a mutex likely owned by task kworker/1:43:4405. task:kworker/1:43 state:R running task stack:0 pid:4405 tgid:4405 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65684>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:84b5c800 r8:80200c04 r7:df9e5d54 r6:ffffffff r5:84b5c800 r4:00000000 [<81a65644>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdf9e5d20 to 0xdf9e5d68) 5d20: cec3e000 eba7b000 00000001 80239bf8 7f027000 00000001 82acb1c4 82aca5a0 5d40: 7f027000 eba7b000 8280c9b4 df9e5d9c df9e5da0 df9e5d70 80230af0 80239c10 5d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9e5dc0 r5:df9e5e08 r4:df9e5dc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85874800 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84b5c800 r7:00000000 r6:83018600 r5:00001000 r4:7f029000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfba5000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:855b2f8c r4:856ce400 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:855b2f8c r4:856ce400 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84b5c800 r8:856ce42c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856ce400 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856ce400 r8:80278fec r7:dfbe5e60 r6:856ce480 r5:84b5c800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e5fb0 to 0xdf9e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:856c9b40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 30 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT Hardware name: ARM-Versatile Express Call trace: [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c arch/arm/kernel/traps.c:257) r7:00000000 r6:00000113 r5:60000193 r4:82252738 [<80201b08>] (show_stack) from [<8021f8f8>] (__dump_stack lib/dump_stack.c:94 [inline]) [<80201b08>] (show_stack) from [<8021f8f8>] (dump_stack_lvl+0x70/0x7c lib/dump_stack.c:120) [<8021f888>] (dump_stack_lvl) from [<8021f91c>] (dump_stack+0x18/0x1c lib/dump_stack.c:129) r5:00000001 r4:00000001 [<8021f904>] (dump_stack) from [<81a4ded4>] (nmi_cpu_backtrace+0x160/0x17c lib/nmi_backtrace.c:113) [<81a4dd74>] (nmi_cpu_backtrace) from [<81a4e020>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8 lib/nmi_backtrace.c:62) r7:00000001 r6:8280c690 r5:8281ae34 r4:ffffffff [<81a4def0>] (nmi_trigger_cpumask_backtrace) from [<802304fc>] (arch_trigger_cpumask_backtrace+0x18/0x1c arch/arm/kernel/smp.c:852) r9:8281ba28 r8:8280c810 r7:00029557 r6:00007b93 r5:82abf7d4 r4:85d3820c [<802304e4>] (arch_trigger_cpumask_backtrace) from [<8037faf0>] (trigger_all_cpu_backtrace include/linux/nmi.h:160 [inline]) [<802304e4>] (arch_trigger_cpumask_backtrace) from [<8037faf0>] (check_hung_uninterruptible_tasks kernel/hung_task.c:332 [inline]) [<802304e4>] (arch_trigger_cpumask_backtrace) from [<8037faf0>] (watchdog+0x5d0/0x850 kernel/hung_task.c:495) [<8037f520>] (watchdog) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:00000000 r8:8037f520 r7:830cfd80 r6:830cfd80 r5:8321c800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf8d9fb0 to 0xdf8d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:833cb7c0 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 2820 Comm: pr/ttyAMA-1 Not tainted syzkaller #0 PREEMPT Hardware name: ARM-Versatile Express PC is at __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:152 [inline] PC is at _raw_spin_unlock_irqrestore+0x28/0x54 kernel/locking/spinlock.c:194 LR is at spin_unlock_irqrestore include/linux/spinlock.h:406 [inline] LR is at __uart_port_unlock_irqrestore include/linux/serial_core.h:616 [inline] LR is at pl011_console_device_unlock+0x20/0x24 drivers/tty/serial/amba-pl011.c:2603 pc : [<81a6e124>] lr : [<80a8f468>] psr: 60000113 sp : eaeb9eb0 ip : eaeb9ec0 fp : eaeb9ebc r10: 82959594 r9 : 00000000 r8 : 00000000 r7 : 00000117 r6 : 829594f8 r5 : 00000000 r4 : 00000001 r3 : 00000ba8 r2 : 00000000 r1 : 60000113 r0 : 83b5e840 Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user Control: 30c5387d Table: 84d2e080 DAC: fffffffd Call trace: [<81a6e0fc>] (_raw_spin_unlock_irqrestore) from [<80a8f468>] (spin_unlock_irqrestore include/linux/spinlock.h:406 [inline]) [<81a6e0fc>] (_raw_spin_unlock_irqrestore) from [<80a8f468>] (__uart_port_unlock_irqrestore include/linux/serial_core.h:616 [inline]) [<81a6e0fc>] (_raw_spin_unlock_irqrestore) from [<80a8f468>] (pl011_console_device_unlock+0x20/0x24 drivers/tty/serial/amba-pl011.c:2603) [<80a8f448>] (pl011_console_device_unlock) from [<802e3750>] (nbcon_emit_one+0x88/0x100 kernel/printk/nbcon.c:1142) [<802e36c8>] (nbcon_emit_one) from [<802e3970>] (nbcon_kthread_func+0x1a8/0x2a4 kernel/printk/nbcon.c:1229) r6:8280c690 r5:84148c00 r4:829594f8 [<802e37c8>] (nbcon_kthread_func) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:829594f8 r8:802e37c8 r7:84a77780 r6:84a77780 r5:84148c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:84176380 final repro crashed as (corrupted=false): INFO: task kworker/1:0:23 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:0 state:D stack:0 pid:23 tgid:23 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65250>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a642bc>] (__schedule) from [<81a65250>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:df879d84 r9:00000002 r8:60000113 r7:829171a0 r6:df879d8c r5:8321a400 r4:8321a400 [<81a65224>] (schedule) from [<81a65638>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:8321a400 r4:8291719c [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67e98>] (__mutex_lock.constprop.0) from [<81a68990>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df879e08 r4:00000000 [<81a6897c>] (__mutex_lock_slowpath) from [<81a689d0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68994>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d85d80 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:8321a400 r7:00000000 r6:83018600 r5:00001000 r4:7f027000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfa65000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84f3978c r4:830cf000 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84f3978c r4:830cf000 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:8321a400 r8:830cf02c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:830cf000 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:830cf000 r8:80278fec r7:df819d50 r6:830cf080 r5:8321a400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf879fb0 to 0xdf879ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:830cd200 INFO: task kworker/1:0:23 is blocked on a mutex likely owned by task kworker/1:43:4405. task:kworker/1:43 state:R running task stack:0 pid:4405 tgid:4405 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65684>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:84b5c800 r8:80200c04 r7:df9e5d54 r6:ffffffff r5:84b5c800 r4:00000000 [<81a65644>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdf9e5d20 to 0xdf9e5d68) 5d20: c787b000 eba7b000 00000001 80239bf8 7f027000 00000001 82acb1c4 82aca5a0 5d40: 7f027000 eba7b000 8280c9b4 df9e5d9c df9e5da0 df9e5d70 80230af0 80239c10 5d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9e5dc0 r5:df9e5e08 r4:df9e5dc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85874800 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84b5c800 r7:00000000 r6:83018600 r5:00001000 r4:7f029000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfba5000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:855b2f8c r4:856ce400 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:855b2f8c r4:856ce400 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84b5c800 r8:856ce42c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856ce400 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856ce400 r8:80278fec r7:dfbe5e60 r6:856ce480 r5:84b5c800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e5fb0 to 0xdf9e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:856c9b40 INFO: task kworker/1:5:4185 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:5 state:D stack:0 pid:4185 tgid:4185 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65250>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a642bc>] (__schedule) from [<81a65250>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:df9b5d84 r9:00000002 r8:60000013 r7:829171a0 r6:df9b5d8c r5:8487d400 r4:8487d400 [<81a65224>] (schedule) from [<81a65638>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:8487d400 r4:8291719c [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67e98>] (__mutex_lock.constprop.0) from [<81a68990>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9b5e08 r4:00000000 [<81a6897c>] (__mutex_lock_slowpath) from [<81a689d0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68994>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d85c80 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:8487d400 r7:00000000 r6:83018600 r5:00001000 r4:7f035000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfaff000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84f3938c r4:857a9f00 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84f3938c r4:857a9f00 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:8487d400 r8:857a9f2c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:857a9f00 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:857a9f00 r8:80278fec r7:dfaa9e60 r6:857a9e80 r5:8487d400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9b5fb0 to 0xdf9b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85779a80 INFO: task kworker/1:5:4185 is blocked on a mutex likely owned by task kworker/1:43:4405. task:kworker/1:43 state:R running task stack:0 pid:4405 tgid:4405 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65684>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:84b5c800 r8:80200c04 r7:df9e5d54 r6:ffffffff r5:84b5c800 r4:00000000 [<81a65644>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdf9e5d20 to 0xdf9e5d68) 5d20: c8252000 eba7b000 00000001 80239bf8 7f027000 00000001 82acb1c4 82aca5a0 5d40: 7f027000 eba7b000 8280c9b4 df9e5d9c df9e5da0 df9e5d70 80230af0 80239c10 5d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9e5dc0 r5:df9e5e08 r4:df9e5dc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85874800 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84b5c800 r7:00000000 r6:83018600 r5:00001000 r4:7f029000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfba5000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:855b2f8c r4:856ce400 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:855b2f8c r4:856ce400 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84b5c800 r8:856ce42c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856ce400 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856ce400 r8:80278fec r7:dfbe5e60 r6:856ce480 r5:84b5c800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e5fb0 to 0xdf9e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:856c9b40 INFO: task kworker/1:8:4193 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:8 state:D stack:0 pid:4193 tgid:4193 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65250>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a642bc>] (__schedule) from [<81a65250>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:dfb09d84 r9:00000002 r8:60000013 r7:829171a0 r6:dfb09d8c r5:8487e000 r4:8487e000 [<81a65224>] (schedule) from [<81a65638>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:8487e000 r4:8291719c [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67e98>] (__mutex_lock.constprop.0) from [<81a68990>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb09e08 r4:00000000 [<81a6897c>] (__mutex_lock_slowpath) from [<81a689d0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68994>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85559740 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:8487e000 r7:00000000 r6:83018600 r5:00001000 r4:7f031000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:e009b000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85473b8c r4:857a9980 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:85473b8c r4:857a9980 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:8487e000 r8:857a99ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:857a9980 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:857a9980 r8:80278fec r7:dfb39e60 r6:857a9800 r5:8487e000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb09fb0 to 0xdfb09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:8555d140 INFO: task kworker/1:8:4193 is blocked on a mutex likely owned by task kworker/1:43:4405. task:kworker/1:43 state:R running task stack:0 pid:4405 tgid:4405 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65684>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:84b5c800 r8:80200c04 r7:df9e5d54 r6:ffffffff r5:84b5c800 r4:00000000 [<81a65644>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdf9e5d20 to 0xdf9e5d68) 5d20: c8252000 eba7b000 00000001 80239bf8 7f027000 00000001 82acb1c4 82aca5a0 5d40: 7f027000 eba7b000 8280c9b4 df9e5d9c df9e5da0 df9e5d70 80230af0 80239c10 5d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9e5dc0 r5:df9e5e08 r4:df9e5dc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85874800 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84b5c800 r7:00000000 r6:83018600 r5:00001000 r4:7f029000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfba5000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:855b2f8c r4:856ce400 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:855b2f8c r4:856ce400 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84b5c800 r8:856ce42c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856ce400 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856ce400 r8:80278fec r7:dfbe5e60 r6:856ce480 r5:84b5c800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e5fb0 to 0xdf9e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:856c9b40 INFO: task kworker/1:11:4206 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:11 state:D stack:0 pid:4206 tgid:4206 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65250>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a642bc>] (__schedule) from [<81a65250>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:dfc19d84 r9:00000002 r8:60000113 r7:829171a0 r6:dfc19d8c r5:84878000 r4:84878000 [<81a65224>] (schedule) from [<81a65638>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:84878000 r4:8291719c [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67e98>] (__mutex_lock.constprop.0) from [<81a68990>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc19e08 r4:00000000 [<81a6897c>] (__mutex_lock_slowpath) from [<81a689d0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68994>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ebd640 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84878000 r7:00000000 r6:83018600 r5:00001000 r4:7f02f000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:e0055000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:855b3b8c r4:857a9580 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:855b3b8c r4:857a9580 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84878000 r8:857a95ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:857a9580 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:857a9580 r8:80278fec r7:dfbf1e60 r6:857a9500 r5:84878000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc19fb0 to 0xdfc19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85779b80 INFO: task kworker/1:11:4206 is blocked on a mutex likely owned by task kworker/1:43:4405. task:kworker/1:43 state:R running task stack:0 pid:4405 tgid:4405 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65684>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:84b5c800 r8:80200c04 r7:df9e5d54 r6:ffffffff r5:84b5c800 r4:00000000 [<81a65644>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdf9e5d20 to 0xdf9e5d68) 5d20: c8252000 eba7b000 00000001 80239bf8 7f027000 00000001 82acb1c4 82aca5a0 5d40: 7f027000 eba7b000 8280c9b4 df9e5d9c df9e5da0 df9e5d70 80230af0 80239c10 5d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9e5dc0 r5:df9e5e08 r4:df9e5dc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85874800 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84b5c800 r7:00000000 r6:83018600 r5:00001000 r4:7f029000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfba5000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:855b2f8c r4:856ce400 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:855b2f8c r4:856ce400 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84b5c800 r8:856ce42c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856ce400 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856ce400 r8:80278fec r7:dfbe5e60 r6:856ce480 r5:84b5c800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e5fb0 to 0xdf9e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:856c9b40 INFO: task kworker/1:39:4326 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:39 state:D stack:0 pid:4326 tgid:4326 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65250>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a642bc>] (__schedule) from [<81a65250>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:dfbe5d84 r9:00000002 r8:60000013 r7:829171a0 r6:dfbe5d8c r5:84890000 r4:84890000 [<81a65224>] (schedule) from [<81a65638>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:84890000 r4:8291719c [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67e98>] (__mutex_lock.constprop.0) from [<81a68990>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbe5e08 r4:00000000 [<81a6897c>] (__mutex_lock_slowpath) from [<81a689d0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68994>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85694900 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84890000 r7:00000000 r6:83018600 r5:00001000 r4:7f029000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfa81000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85472f8c r4:856c4d80 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:85472f8c r4:856c4d80 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84890000 r8:856c4dac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856c4d80 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856c4d80 r8:80278fec r7:dfbe1e60 r6:856bd180 r5:84890000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbe5fb0 to 0xdfbe5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:8555e0c0 INFO: task kworker/1:39:4326 is blocked on a mutex likely owned by task kworker/1:43:4405. task:kworker/1:43 state:R running task stack:0 pid:4405 tgid:4405 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65684>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:84b5c800 r8:80200c04 r7:df9e5d54 r6:ffffffff r5:84b5c800 r4:00000000 [<81a65644>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdf9e5d20 to 0xdf9e5d68) 5d20: c8252000 eba7b000 00000001 80239bf8 7f027000 00000001 82acb1c4 82aca5a0 5d40: 7f027000 eba7b000 8280c9b4 df9e5d9c df9e5da0 df9e5d70 80230af0 80239c10 5d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9e5dc0 r5:df9e5e08 r4:df9e5dc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85874800 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84b5c800 r7:00000000 r6:83018600 r5:00001000 r4:7f029000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfba5000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:855b2f8c r4:856ce400 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:855b2f8c r4:856ce400 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84b5c800 r8:856ce42c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856ce400 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856ce400 r8:80278fec r7:dfbe5e60 r6:856ce480 r5:84b5c800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e5fb0 to 0xdf9e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:856c9b40 INFO: task kworker/1:40:4328 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:40 state:D stack:0 pid:4328 tgid:4328 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65250>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a642bc>] (__schedule) from [<81a65250>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:df9e1d84 r9:00000002 r8:60000113 r7:829171a0 r6:df9e1d8c r5:84b58000 r4:84b58000 [<81a65224>] (schedule) from [<81a65638>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:84b58000 r4:8291719c [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67e98>] (__mutex_lock.constprop.0) from [<81a68990>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9e1e08 r4:00000000 [<81a6897c>] (__mutex_lock_slowpath) from [<81a689d0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68994>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85624580 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84b58000 r7:00000000 r6:83018600 r5:00001000 r4:7f04b000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea6a5000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84f3838c r4:856c4e00 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84f3838c r4:856c4e00 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84b58000 r8:856c4e2c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856c4e00 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856c4e00 r8:80278fec r7:dfbe1e60 r6:856c4f00 r5:84b58000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e1fb0 to 0xdf9e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:8555e0c0 INFO: task kworker/1:40:4328 is blocked on a mutex likely owned by task kworker/1:43:4405. task:kworker/1:43 state:R running task stack:0 pid:4405 tgid:4405 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65684>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:84b5c800 r8:80200c04 r7:df9e5d54 r6:ffffffff r5:84b5c800 r4:00000000 [<81a65644>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdf9e5d20 to 0xdf9e5d68) 5d20: c8252000 eba7b000 00000001 80239bf8 7f027000 00000001 82acb1c4 82aca5a0 5d40: 7f027000 eba7b000 8280c9b4 df9e5d9c df9e5da0 df9e5d70 80230af0 80239c10 5d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9e5dc0 r5:df9e5e08 r4:df9e5dc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85874800 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84b5c800 r7:00000000 r6:83018600 r5:00001000 r4:7f029000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfba5000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:855b2f8c r4:856ce400 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:855b2f8c r4:856ce400 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84b5c800 r8:856ce42c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856ce400 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856ce400 r8:80278fec r7:dfbe5e60 r6:856ce480 r5:84b5c800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e5fb0 to 0xdf9e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:856c9b40 INFO: task kworker/1:41:4400 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:41 state:D stack:0 pid:4400 tgid:4400 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65250>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a642bc>] (__schedule) from [<81a65250>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:e003dd84 r9:00000002 r8:60000013 r7:829171a0 r6:e003dd8c r5:856d6c00 r4:856d6c00 [<81a65224>] (schedule) from [<81a65638>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:856d6c00 r4:8291719c [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67e98>] (__mutex_lock.constprop.0) from [<81a68990>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e003de08 r4:00000000 [<81a6897c>] (__mutex_lock_slowpath) from [<81a689d0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68994>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85619d40 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:856d6c00 r7:00000000 r6:83018600 r5:00001000 r4:7f041000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea5a3000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85470b8c r4:856ce180 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:85470b8c r4:856ce180 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:856d6c00 r8:856ce1ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856ce180 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856ce180 r8:80278fec r7:dfbe5e60 r6:85414400 r5:856d6c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe003dfb0 to 0xe003dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85416a00 INFO: task kworker/1:41:4400 is blocked on a mutex likely owned by task kworker/1:43:4405. task:kworker/1:43 state:R running task stack:0 pid:4405 tgid:4405 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65684>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:84b5c800 r8:80200c04 r7:df9e5d54 r6:ffffffff r5:84b5c800 r4:00000000 [<81a65644>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdf9e5d20 to 0xdf9e5d68) 5d20: c8252000 eba7b000 00000001 80239bf8 7f027000 00000001 82acb1c4 82aca5a0 5d40: 7f027000 eba7b000 8280c9b4 df9e5d9c df9e5da0 df9e5d70 80230af0 80239c10 5d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9e5dc0 r5:df9e5e08 r4:df9e5dc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85874800 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84b5c800 r7:00000000 r6:83018600 r5:00001000 r4:7f029000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfba5000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:855b2f8c r4:856ce400 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:855b2f8c r4:856ce400 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84b5c800 r8:856ce42c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856ce400 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856ce400 r8:80278fec r7:dfbe5e60 r6:856ce480 r5:84b5c800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e5fb0 to 0xdf9e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:856c9b40 INFO: task kworker/1:42:4402 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:42 state:D stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65250>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a642bc>] (__schedule) from [<81a65250>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:e00edd84 r9:00000002 r8:60000013 r7:829171a0 r6:e00edd8c r5:84f11800 r4:84f11800 [<81a65224>] (schedule) from [<81a65638>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:84f11800 r4:8291719c [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67e98>] (__mutex_lock.constprop.0) from [<81a68990>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00ede08 r4:00000000 [<81a6897c>] (__mutex_lock_slowpath) from [<81a689d0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68994>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85619300 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84f11800 r7:00000000 r6:83018600 r5:00001000 r4:7f033000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea4f9000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:858f578c r4:856ce380 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:858f578c r4:856ce380 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84f11800 r8:856ce3ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856ce380 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856ce380 r8:80278fec r7:e003de60 r6:85414480 r5:84f11800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00edfb0 to 0xe00edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85416880 INFO: task kworker/1:42:4402 is blocked on a mutex likely owned by task kworker/1:43:4405. task:kworker/1:43 state:R running task stack:0 pid:4405 tgid:4405 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65684>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:84b5c800 r8:80200c04 r7:df9e5d54 r6:ffffffff r5:84b5c800 r4:00000000 [<81a65644>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdf9e5d20 to 0xdf9e5d68) 5d20: c8252000 eba7b000 00000001 80239bf8 7f027000 00000001 82acb1c4 82aca5a0 5d40: 7f027000 eba7b000 8280c9b4 df9e5d9c df9e5da0 df9e5d70 80230af0 80239c10 5d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9e5dc0 r5:df9e5e08 r4:df9e5dc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85874800 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84b5c800 r7:00000000 r6:83018600 r5:00001000 r4:7f029000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfba5000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:855b2f8c r4:856ce400 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:855b2f8c r4:856ce400 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84b5c800 r8:856ce42c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856ce400 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856ce400 r8:80278fec r7:dfbe5e60 r6:856ce480 r5:84b5c800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e5fb0 to 0xdf9e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:856c9b40 INFO: task kworker/1:44:4420 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:44 state:D stack:0 pid:4420 tgid:4420 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65250>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a642bc>] (__schedule) from [<81a65250>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:dfb45d84 r9:00000002 r8:60000013 r7:829171a0 r6:dfb45d8c r5:85765400 r4:85765400 [<81a65224>] (schedule) from [<81a65638>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:85765400 r4:8291719c [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67e98>] (__mutex_lock.constprop.0) from [<81a68990>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb45e08 r4:00000000 [<81a6897c>] (__mutex_lock_slowpath) from [<81a689d0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68994>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85410f00 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:85765400 r7:00000000 r6:83018600 r5:00001000 r4:7f02f000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dffe7000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:8547378c r4:856ce580 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:8547378c r4:856ce580 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85765400 r8:856ce5ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856ce580 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856ce580 r8:80278fec r7:df9e5e60 r6:85414c00 r5:85765400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb45fb0 to 0xdfb45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:84ebb3c0 INFO: task kworker/1:44:4420 is blocked on a mutex likely owned by task kworker/1:43:4405. task:kworker/1:43 state:R running task stack:0 pid:4405 tgid:4405 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65684>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:84b5c800 r8:80200c04 r7:df9e5d54 r6:ffffffff r5:84b5c800 r4:00000000 [<81a65644>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdf9e5d20 to 0xdf9e5d68) 5d20: c8252000 eba7b000 00000001 80239bf8 7f027000 00000001 82acb1c4 82aca5a0 5d40: 7f027000 eba7b000 8280c9b4 df9e5d9c df9e5da0 df9e5d70 80230af0 80239c10 5d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9e5dc0 r5:df9e5e08 r4:df9e5dc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85874800 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84b5c800 r7:00000000 r6:83018600 r5:00001000 r4:7f029000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfba5000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:855b2f8c r4:856ce400 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:855b2f8c r4:856ce400 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84b5c800 r8:856ce42c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856ce400 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856ce400 r8:80278fec r7:dfbe5e60 r6:856ce480 r5:84b5c800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e5fb0 to 0xdf9e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:856c9b40 INFO: task kworker/1:45:4422 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:45 state:D stack:0 pid:4422 tgid:4422 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65250>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a642bc>] (__schedule) from [<81a65250>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:dfb55d84 r9:00000002 r8:60000113 r7:829171a0 r6:dfb55d8c r5:85766000 r4:85766000 [<81a65224>] (schedule) from [<81a65638>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:85766000 r4:8291719c [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67e98>] (__mutex_lock.constprop.0) from [<81a68990>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb55e08 r4:00000000 [<81a6897c>] (__mutex_lock_slowpath) from [<81a689d0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68994>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85872c00 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:85766000 r7:00000000 r6:83018600 r5:00001000 r4:7f00f000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:df95f000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85472b8c r4:856ce600 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:85472b8c r4:856ce600 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85766000 r8:856ce62c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856ce600 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856ce600 r8:80278fec r7:df9e5e60 r6:85414c80 r5:85766000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb55fb0 to 0xdfb55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:8540a940 INFO: task kworker/1:45:4422 is blocked on a mutex likely owned by task kworker/1:43:4405. task:kworker/1:43 state:R running task stack:0 pid:4405 tgid:4405 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65684>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:84b5c800 r8:80200c04 r7:df9e5d54 r6:ffffffff r5:84b5c800 r4:00000000 [<81a65644>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdf9e5d20 to 0xdf9e5d68) 5d20: c8252000 eba7b000 00000001 80239bf8 7f027000 00000001 82acb1c4 82aca5a0 5d40: 7f027000 eba7b000 8280c9b4 df9e5d9c df9e5da0 df9e5d70 80230af0 80239c10 5d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9e5dc0 r5:df9e5e08 r4:df9e5dc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85874800 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84b5c800 r7:00000000 r6:83018600 r5:00001000 r4:7f029000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfba5000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:855b2f8c r4:856ce400 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:855b2f8c r4:856ce400 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84b5c800 r8:856ce42c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856ce400 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856ce400 r8:80278fec r7:dfbe5e60 r6:856ce480 r5:84b5c800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e5fb0 to 0xdf9e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:856c9b40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:46:4426 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:46 state:D stack:0 pid:4426 tgid:4426 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65250>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a642bc>] (__schedule) from [<81a65250>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:e0031d84 r9:00000002 r8:60000113 r7:829171a0 r6:e0031d8c r5:85763000 r4:85763000 [<81a65224>] (schedule) from [<81a65638>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:85763000 r4:8291719c [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67e98>] (__mutex_lock.constprop.0) from [<81a68990>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0031e08 r4:00000000 [<81a6897c>] (__mutex_lock_slowpath) from [<81a689d0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68994>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857dd940 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:85763000 r7:00000000 r6:83018600 r5:00001000 r4:7f02d000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfc4f000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:854cbf8c r4:856ce700 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:854cbf8c r4:856ce700 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85763000 r8:856ce72c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856ce700 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856ce700 r8:80278fec r7:dfb55e60 r6:85414e00 r5:85763000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0031fb0 to 0xe0031ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85415340 INFO: task kworker/1:46:4426 is blocked on a mutex likely owned by task kworker/1:43:4405. task:kworker/1:43 state:R running task stack:0 pid:4405 tgid:4405 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65684>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:84b5c800 r8:80200c04 r7:df9e5d54 r6:ffffffff r5:84b5c800 r4:00000000 [<81a65644>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdf9e5d20 to 0xdf9e5d68) 5d20: c8252000 eba7b000 00000001 80239bf8 7f027000 00000001 82acb1c4 82aca5a0 5d40: 7f027000 eba7b000 8280c9b4 df9e5d9c df9e5da0 df9e5d70 80230af0 80239c10 5d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9e5dc0 r5:df9e5e08 r4:df9e5dc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85874800 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84b5c800 r7:00000000 r6:83018600 r5:00001000 r4:7f029000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfba5000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:855b2f8c r4:856ce400 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:855b2f8c r4:856ce400 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84b5c800 r8:856ce42c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856ce400 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856ce400 r8:80278fec r7:dfbe5e60 r6:856ce480 r5:84b5c800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e5fb0 to 0xdf9e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:856c9b40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:47:4429 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:47 state:D stack:0 pid:4429 tgid:4429 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65250>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a642bc>] (__schedule) from [<81a65250>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:dfc35d84 r9:00000002 r8:60000113 r7:829171a0 r6:dfc35d8c r5:84f18c00 r4:84f18c00 [<81a65224>] (schedule) from [<81a65638>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:84f18c00 r4:8291719c [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67e98>] (__mutex_lock.constprop.0) from [<81a68990>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc35e08 r4:00000000 [<81a6897c>] (__mutex_lock_slowpath) from [<81a689d0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68994>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856b1580 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84f18c00 r7:00000000 r6:83018600 r5:00001000 r4:7f02b000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfbe7000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:8547178c r4:856ce780 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:8547178c r4:856ce780 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84f18c00 r8:856ce7ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856ce780 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856ce780 r8:80278fec r7:dfb55e60 r6:8540c080 r5:84f18c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc35fb0 to 0xdfc35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:857b3240 INFO: task kworker/1:47:4429 is blocked on a mutex likely owned by task kworker/1:43:4405. task:kworker/1:43 state:R running task stack:0 pid:4405 tgid:4405 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65684>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:84b5c800 r8:80200c04 r7:df9e5d54 r6:ffffffff r5:84b5c800 r4:00000000 [<81a65644>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdf9e5d20 to 0xdf9e5d68) 5d20: c8252000 eba7b000 00000001 80239bf8 7f027000 00000001 82acb1c4 82aca5a0 5d40: 7f027000 eba7b000 8280c9b4 df9e5d9c df9e5da0 df9e5d70 80230af0 80239c10 5d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9e5dc0 r5:df9e5e08 r4:df9e5dc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85874800 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84b5c800 r7:00000000 r6:83018600 r5:00001000 r4:7f029000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfba5000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:855b2f8c r4:856ce400 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:855b2f8c r4:856ce400 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84b5c800 r8:856ce42c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856ce400 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856ce400 r8:80278fec r7:dfbe5e60 r6:856ce480 r5:84b5c800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e5fb0 to 0xdf9e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:856c9b40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:48:4431 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:48 state:D stack:0 pid:4431 tgid:4431 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65250>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a642bc>] (__schedule) from [<81a65250>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:e0119d84 r9:00000002 r8:60000113 r7:829171a0 r6:e0119d8c r5:84f19800 r4:84f19800 [<81a65224>] (schedule) from [<81a65638>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:84f19800 r4:8291719c [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67e98>] (__mutex_lock.constprop.0) from [<81a68990>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0119e08 r4:00000000 [<81a6897c>] (__mutex_lock_slowpath) from [<81a689d0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68994>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85694000 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84f19800 r7:00000000 r6:83018600 r5:00001000 r4:7f045000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea7d9000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85471f8c r4:856ce800 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:85471f8c r4:856ce800 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84f19800 r8:856ce82c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856ce800 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856ce800 r8:80278fec r7:dfb55e60 r6:8540c100 r5:84f19800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0119fb0 to 0xe0119ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:857d9f00 INFO: task kworker/1:48:4431 is blocked on a mutex likely owned by task kworker/1:43:4405. task:kworker/1:43 state:R running task stack:0 pid:4405 tgid:4405 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65684>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:84b5c800 r8:80200c04 r7:df9e5d54 r6:ffffffff r5:84b5c800 r4:00000000 [<81a65644>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdf9e5d20 to 0xdf9e5d68) 5d20: c8252000 eba7b000 00000001 80239bf8 7f027000 00000001 82acb1c4 82aca5a0 5d40: 7f027000 eba7b000 8280c9b4 df9e5d9c df9e5da0 df9e5d70 80230af0 80239c10 5d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9e5dc0 r5:df9e5e08 r4:df9e5dc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85874800 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84b5c800 r7:00000000 r6:83018600 r5:00001000 r4:7f029000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfba5000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:855b2f8c r4:856ce400 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:855b2f8c r4:856ce400 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84b5c800 r8:856ce42c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856ce400 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856ce400 r8:80278fec r7:dfbe5e60 r6:856ce480 r5:84b5c800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e5fb0 to 0xdf9e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:856c9b40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:49:4433 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:49 state:D stack:0 pid:4433 tgid:4433 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65250>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a642bc>] (__schedule) from [<81a65250>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:e0165d84 r9:00000002 r8:60000113 r7:829171a0 r6:e0165d8c r5:84b5ec00 r4:84b5ec00 [<81a65224>] (schedule) from [<81a65638>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:84b5ec00 r4:8291719c [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67e98>] (__mutex_lock.constprop.0) from [<81a68990>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0165e08 r4:00000000 [<81a6897c>] (__mutex_lock_slowpath) from [<81a689d0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68994>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85779a80 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84b5ec00 r7:00000000 r6:83018600 r5:00001000 r4:7f039000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:e4239000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84f24f8c r4:856ce880 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84f24f8c r4:856ce880 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84b5ec00 r8:856ce8ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856ce880 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856ce880 r8:80278fec r7:dfb55e60 r6:856ce900 r5:84b5ec00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0165fb0 to 0xe0165ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:856c8000 INFO: task kworker/1:49:4433 is blocked on a mutex likely owned by task kworker/1:43:4405. task:kworker/1:43 state:R running task stack:0 pid:4405 tgid:4405 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65684>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:84b5c800 r8:80200c04 r7:df9e5d54 r6:ffffffff r5:84b5c800 r4:00000000 [<81a65644>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdf9e5d20 to 0xdf9e5d68) 5d20: c8252000 eba7b000 00000001 80239bf8 7f027000 00000001 82acb1c4 82aca5a0 5d40: 7f027000 eba7b000 8280c9b4 df9e5d9c df9e5da0 df9e5d70 80230af0 80239c10 5d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9e5dc0 r5:df9e5e08 r4:df9e5dc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85874800 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84b5c800 r7:00000000 r6:83018600 r5:00001000 r4:7f029000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfba5000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:855b2f8c r4:856ce400 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:855b2f8c r4:856ce400 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84b5c800 r8:856ce42c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856ce400 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856ce400 r8:80278fec r7:dfbe5e60 r6:856ce480 r5:84b5c800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e5fb0 to 0xdf9e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:856c9b40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:50:4434 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:50 state:D stack:0 pid:4434 tgid:4434 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65250>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a642bc>] (__schedule) from [<81a65250>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:e016dd84 r9:00000002 r8:60000013 r7:829171a0 r6:e016dd8c r5:84b5b000 r4:84b5b000 [<81a65224>] (schedule) from [<81a65638>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:84b5b000 r4:8291719c [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67e98>] (__mutex_lock.constprop.0) from [<81a68990>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e016de08 r4:00000000 [<81a6897c>] (__mutex_lock_slowpath) from [<81a689d0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68994>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555c140 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84b5b000 r7:00000000 r6:83018600 r5:00001000 r4:7f049000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea977000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:8547278c r4:856ce980 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:8547278c r4:856ce980 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84b5b000 r8:856ce9ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856ce980 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856ce980 r8:80278fec r7:e0165e60 r6:856cea00 r5:84b5b000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe016dfb0 to 0xe016dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:856c8000 INFO: task kworker/1:50:4434 is blocked on a mutex likely owned by task kworker/1:43:4405. task:kworker/1:43 state:R running task stack:0 pid:4405 tgid:4405 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65684>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:84b5c800 r8:80200c04 r7:df9e5d54 r6:ffffffff r5:84b5c800 r4:00000000 [<81a65644>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdf9e5d20 to 0xdf9e5d68) 5d20: c8252000 eba7b000 00000001 80239bf8 7f027000 00000001 82acb1c4 82aca5a0 5d40: 7f027000 eba7b000 8280c9b4 df9e5d9c df9e5da0 df9e5d70 80230af0 80239c10 5d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9e5dc0 r5:df9e5e08 r4:df9e5dc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85874800 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84b5c800 r7:00000000 r6:83018600 r5:00001000 r4:7f029000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfba5000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:855b2f8c r4:856ce400 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:855b2f8c r4:856ce400 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84b5c800 r8:856ce42c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856ce400 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856ce400 r8:80278fec r7:dfbe5e60 r6:856ce480 r5:84b5c800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e5fb0 to 0xdf9e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:856c9b40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:51:4437 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:51 state:D stack:0 pid:4437 tgid:4437 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65250>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a642bc>] (__schedule) from [<81a65250>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:e00f5d84 r9:00000002 r8:60000113 r7:829171a0 r6:e00f5d8c r5:84b5bc00 r4:84b5bc00 [<81a65224>] (schedule) from [<81a65638>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:84b5bc00 r4:8291719c [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67e98>] (__mutex_lock.constprop.0) from [<81a68990>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00f5e08 r4:00000000 [<81a6897c>] (__mutex_lock_slowpath) from [<81a689d0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68994>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8541b580 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84b5bc00 r7:00000000 r6:83018600 r5:00001000 r4:7f043000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea751000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:85471b8c r4:856cea80 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:85471b8c r4:856cea80 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84b5bc00 r8:856ceaac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856cea80 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856cea80 r8:80278fec r7:e0165e60 r6:856ceb00 r5:84b5bc00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00f5fb0 to 0xe00f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:856c8700 INFO: task kworker/1:51:4437 is blocked on a mutex likely owned by task kworker/1:43:4405. task:kworker/1:43 state:R running task stack:0 pid:4405 tgid:4405 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65684>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:84b5c800 r8:80200c04 r7:df9e5d54 r6:ffffffff r5:84b5c800 r4:00000000 [<81a65644>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdf9e5d20 to 0xdf9e5d68) 5d20: c8252000 eba7b000 00000001 80239bf8 7f027000 00000001 82acb1c4 82aca5a0 5d40: 7f027000 eba7b000 8280c9b4 df9e5d9c df9e5da0 df9e5d70 80230af0 80239c10 5d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9e5dc0 r5:df9e5e08 r4:df9e5dc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85874800 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84b5c800 r7:00000000 r6:83018600 r5:00001000 r4:7f029000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfba5000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:855b2f8c r4:856ce400 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:855b2f8c r4:856ce400 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84b5c800 r8:856ce42c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856ce400 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856ce400 r8:80278fec r7:dfbe5e60 r6:856ce480 r5:84b5c800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e5fb0 to 0xdf9e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:856c9b40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:52:4439 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:52 state:D stack:0 pid:4439 tgid:4439 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65250>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a642bc>] (__schedule) from [<81a65250>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:e0195d84 r9:00000002 r8:60000013 r7:829171a0 r6:e0195d8c r5:84b5d400 r4:84b5d400 [<81a65224>] (schedule) from [<81a65638>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:84b5d400 r4:8291719c [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67e98>] (__mutex_lock.constprop.0) from [<81a68990>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0195e08 r4:00000000 [<81a6897c>] (__mutex_lock_slowpath) from [<81a689d0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68994>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857b8700 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84b5d400 r7:00000000 r6:83018600 r5:00001000 r4:7f047000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea8cd000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:8547238c r4:856ceb80 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:8547238c r4:856ceb80 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84b5d400 r8:856cebac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856ceb80 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856ceb80 r8:80278fec r7:e0165e60 r6:856cec00 r5:84b5d400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0195fb0 to 0xe0195ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:856c8b80 INFO: task kworker/1:52:4439 is blocked on a mutex likely owned by task kworker/1:43:4405. task:kworker/1:43 state:R running task stack:0 pid:4405 tgid:4405 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65684>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:84b5c800 r8:80200c04 r7:df9e5d54 r6:ffffffff r5:84b5c800 r4:00000000 [<81a65644>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdf9e5d20 to 0xdf9e5d68) 5d20: c8252000 eba7b000 00000001 80239bf8 7f027000 00000001 82acb1c4 82aca5a0 5d40: 7f027000 eba7b000 8280c9b4 df9e5d9c df9e5da0 df9e5d70 80230af0 80239c10 5d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9e5dc0 r5:df9e5e08 r4:df9e5dc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85874800 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84b5c800 r7:00000000 r6:83018600 r5:00001000 r4:7f029000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfba5000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:855b2f8c r4:856ce400 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:855b2f8c r4:856ce400 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84b5c800 r8:856ce42c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856ce400 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856ce400 r8:80278fec r7:dfbe5e60 r6:856ce480 r5:84b5c800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e5fb0 to 0xdf9e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:856c9b40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:53:4442 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:53 state:D stack:0 pid:4442 tgid:4442 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65250>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a642bc>] (__schedule) from [<81a65250>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:e0199d84 r9:00000002 r8:60000013 r7:829171a0 r6:e0199d8c r5:84b5e000 r4:84b5e000 [<81a65224>] (schedule) from [<81a65638>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:84b5e000 r4:8291719c [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67e98>] (__mutex_lock.constprop.0) from [<81a68990>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0199e08 r4:00000000 [<81a6897c>] (__mutex_lock_slowpath) from [<81a689d0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68994>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85430a80 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84b5e000 r7:00000000 r6:83018600 r5:00001000 r4:7f031000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:e4205000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:855b3f8c r4:856cec80 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:855b3f8c r4:856cec80 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84b5e000 r8:856cecac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856cec80 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856cec80 r8:80278fec r7:e0165e60 r6:856ced00 r5:84b5e000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0199fb0 to 0xe0199ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:856c8f00 INFO: task kworker/1:53:4442 is blocked on a mutex likely owned by task kworker/1:43:4405. task:kworker/1:43 state:R running task stack:0 pid:4405 tgid:4405 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65684>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:84b5c800 r8:80200c04 r7:df9e5d54 r6:ffffffff r5:84b5c800 r4:00000000 [<81a65644>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdf9e5d20 to 0xdf9e5d68) 5d20: c8252000 eba7b000 00000001 80239bf8 7f027000 00000001 82acb1c4 82aca5a0 5d40: 7f027000 eba7b000 8280c9b4 df9e5d9c df9e5da0 df9e5d70 80230af0 80239c10 5d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9e5dc0 r5:df9e5e08 r4:df9e5dc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85874800 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84b5c800 r7:00000000 r6:83018600 r5:00001000 r4:7f029000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfba5000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:855b2f8c r4:856ce400 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:855b2f8c r4:856ce400 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84b5c800 r8:856ce42c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856ce400 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856ce400 r8:80278fec r7:dfbe5e60 r6:856ce480 r5:84b5c800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e5fb0 to 0xdf9e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:856c9b40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:54:4443 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:54 state:D stack:0 pid:4443 tgid:4443 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65250>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a642bc>] (__schedule) from [<81a65250>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:e0185d84 r9:00000002 r8:60000013 r7:829171a0 r6:e0185d8c r5:84870000 r4:84870000 [<81a65224>] (schedule) from [<81a65638>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:84870000 r4:8291719c [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67e98>] (__mutex_lock.constprop.0) from [<81a68990>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0185e08 r4:00000000 [<81a6897c>] (__mutex_lock_slowpath) from [<81a689d0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68994>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85415880 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84870000 r7:00000000 r6:83018600 r5:00001000 r4:7f03d000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea3eb000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:8547038c r4:856ced80 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:8547038c r4:856ced80 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84870000 r8:856cedac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856ced80 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856ced80 r8:80278fec r7:e0165e60 r6:856cee80 r5:84870000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0185fb0 to 0xe0185ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:856c8f00 INFO: task kworker/1:54:4443 is blocked on a mutex likely owned by task kworker/1:43:4405. task:kworker/1:43 state:R running task stack:0 pid:4405 tgid:4405 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65684>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:84b5c800 r8:80200c04 r7:df9e5d54 r6:ffffffff r5:84b5c800 r4:00000000 [<81a65644>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdf9e5d20 to 0xdf9e5d68) 5d20: c8252000 eba7b000 00000001 80239bf8 7f027000 00000001 82acb1c4 82aca5a0 5d40: 7f027000 eba7b000 8280c9b4 df9e5d9c df9e5da0 df9e5d70 80230af0 80239c10 5d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9e5dc0 r5:df9e5e08 r4:df9e5dc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85874800 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84b5c800 r7:00000000 r6:83018600 r5:00001000 r4:7f029000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfba5000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:855b2f8c r4:856ce400 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:855b2f8c r4:856ce400 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84b5c800 r8:856ce42c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856ce400 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856ce400 r8:80278fec r7:dfbe5e60 r6:856ce480 r5:84b5c800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e5fb0 to 0xdf9e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:856c9b40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:55:4445 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:55 state:D stack:0 pid:4445 tgid:4445 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65250>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a642bc>] (__schedule) from [<81a65250>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:dfa49d84 r9:00000002 r8:60000113 r7:829171a0 r6:dfa49d8c r5:84871800 r4:84871800 [<81a65224>] (schedule) from [<81a65638>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:84871800 r4:8291719c [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67e98>] (__mutex_lock.constprop.0) from [<81a68990>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa49e08 r4:00000000 [<81a6897c>] (__mutex_lock_slowpath) from [<81a689d0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68994>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84eb8c80 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84871800 r7:00000000 r6:83018600 r5:00001000 r4:7f027000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfa3d000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:84f2538c r4:856cef00 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:84f2538c r4:856cef00 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84871800 r8:856cef2c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856cef00 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856cef00 r8:80278fec r7:e0165e60 r6:856cef80 r5:84871800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa49fb0 to 0xdfa49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:856c8580 INFO: task kworker/1:55:4445 is blocked on a mutex likely owned by task kworker/1:43:4405. task:kworker/1:43 state:R running task stack:0 pid:4405 tgid:4405 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65684>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:84b5c800 r8:80200c04 r7:df9e5d54 r6:ffffffff r5:84b5c800 r4:00000000 [<81a65644>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdf9e5d20 to 0xdf9e5d68) 5d20: c8252000 eba7b000 00000001 80239bf8 7f027000 00000001 82acb1c4 82aca5a0 5d40: 7f027000 eba7b000 8280c9b4 df9e5d9c df9e5da0 df9e5d70 80230af0 80239c10 5d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9e5dc0 r5:df9e5e08 r4:df9e5dc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85874800 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84b5c800 r7:00000000 r6:83018600 r5:00001000 r4:7f029000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfba5000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:855b2f8c r4:856ce400 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:855b2f8c r4:856ce400 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84b5c800 r8:856ce42c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856ce400 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856ce400 r8:80278fec r7:dfbe5e60 r6:856ce480 r5:84b5c800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e5fb0 to 0xdf9e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:856c9b40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:56:4447 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:56 state:D stack:0 pid:4447 tgid:4447 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65250>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a642bc>] (__schedule) from [<81a65250>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:e01d5d84 r9:00000002 r8:60000113 r7:829171a0 r6:e01d5d8c r5:84870c00 r4:84870c00 [<81a65224>] (schedule) from [<81a65638>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:84870c00 r4:8291719c [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67e98>] (__mutex_lock.constprop.0) from [<81a68990>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e01d5e08 r4:00000000 [<81a6897c>] (__mutex_lock_slowpath) from [<81a689d0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68994>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85779480 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84870c00 r7:00000000 r6:83018600 r5:00001000 r4:7f03b000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:e82f1000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:858f7f8c r4:856ce200 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:858f7f8c r4:856ce200 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84870c00 r8:856ce22c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856ce200 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856ce200 r8:80278fec r7:dfa49e60 r6:856ce300 r5:84870c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe01d5fb0 to 0xe01d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:856cb840 INFO: task kworker/1:56:4447 is blocked on a mutex likely owned by task kworker/1:43:4405. task:kworker/1:43 state:R running task stack:0 pid:4405 tgid:4405 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65684>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:84b5c800 r8:80200c04 r7:df9e5d54 r6:ffffffff r5:84b5c800 r4:00000000 [<81a65644>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdf9e5d20 to 0xdf9e5d68) 5d20: c8252000 eba7b000 00000001 80239bf8 7f027000 00000001 82acb1c4 82aca5a0 5d40: 7f027000 eba7b000 8280c9b4 df9e5d9c df9e5da0 df9e5d70 80230af0 80239c10 5d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9e5dc0 r5:df9e5e08 r4:df9e5dc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85874800 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84b5c800 r7:00000000 r6:83018600 r5:00001000 r4:7f029000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfba5000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:855b2f8c r4:856ce400 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:855b2f8c r4:856ce400 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84b5c800 r8:856ce42c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856ce400 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856ce400 r8:80278fec r7:dfbe5e60 r6:856ce480 r5:84b5c800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e5fb0 to 0xdf9e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:856c9b40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:57:4449 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:57 state:D stack:0 pid:4449 tgid:4449 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65250>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a642bc>] (__schedule) from [<81a65250>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:e01d9d84 r9:00000002 r8:60000013 r7:829171a0 r6:e01d9d8c r5:84873000 r4:84873000 [<81a65224>] (schedule) from [<81a65638>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:84873000 r4:8291719c [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67e98>] (__mutex_lock.constprop.0) from [<81a68990>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e01d9e08 r4:00000000 [<81a6897c>] (__mutex_lock_slowpath) from [<81a689d0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68994>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85779100 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84873000 r7:00000000 r6:83018600 r5:00001000 r4:7f037000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:e013b000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:857a0f8c r4:856ce280 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:857a0f8c r4:856ce280 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84873000 r8:856ce2ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856ce280 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856ce280 r8:80278fec r7:dfa49e60 r6:856ce080 r5:84873000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe01d9fb0 to 0xe01d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:8555eb00 INFO: task kworker/1:57:4449 is blocked on a mutex likely owned by task kworker/1:43:4405. task:kworker/1:43 state:R running task stack:0 pid:4405 tgid:4405 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65684>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:84b5c800 r8:80200c04 r7:df9e5d54 r6:ffffffff r5:84b5c800 r4:00000000 [<81a65644>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdf9e5d20 to 0xdf9e5d68) 5d20: c8252000 eba7b000 00000001 80239bf8 7f027000 00000001 82acb1c4 82aca5a0 5d40: 7f027000 eba7b000 8280c9b4 df9e5d9c df9e5da0 df9e5d70 80230af0 80239c10 5d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9e5dc0 r5:df9e5e08 r4:df9e5dc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85874800 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84b5c800 r7:00000000 r6:83018600 r5:00001000 r4:7f029000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfba5000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:855b2f8c r4:856ce400 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:855b2f8c r4:856ce400 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84b5c800 r8:856ce42c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856ce400 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856ce400 r8:80278fec r7:dfbe5e60 r6:856ce480 r5:84b5c800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e5fb0 to 0xdf9e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:856c9b40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:58:4451 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:58 state:D stack:0 pid:4451 tgid:4451 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65250>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a642bc>] (__schedule) from [<81a65250>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:e4209d84 r9:00000002 r8:60000013 r7:829171a0 r6:e4209d8c r5:84873c00 r4:84873c00 [<81a65224>] (schedule) from [<81a65638>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:84873c00 r4:8291719c [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67e98>] (__mutex_lock.constprop.0) from [<81a68990>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4209e08 r4:00000000 [<81a6897c>] (__mutex_lock_slowpath) from [<81a689d0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68994>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85619c80 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84873c00 r7:00000000 r6:83018600 r5:00001000 r4:7f035000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfb11000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:855b0f8c r4:856c4980 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:855b0f8c r4:856c4980 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84873c00 r8:856c49ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856c4980 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856c4980 r8:80278fec r7:dfa49e60 r6:856cd000 r5:84873c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4209fb0 to 0xe4209ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:856c3400 INFO: task kworker/1:58:4451 is blocked on a mutex likely owned by task kworker/1:43:4405. task:kworker/1:43 state:R running task stack:0 pid:4405 tgid:4405 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65684>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:84b5c800 r8:80200c04 r7:df9e5d54 r6:ffffffff r5:84b5c800 r4:00000000 [<81a65644>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdf9e5d20 to 0xdf9e5d68) 5d20: c8252000 eba7b000 00000001 80239bf8 7f027000 00000001 82acb1c4 82aca5a0 5d40: 7f027000 eba7b000 8280c9b4 df9e5d9c df9e5da0 df9e5d70 80230af0 80239c10 5d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9e5dc0 r5:df9e5e08 r4:df9e5dc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85874800 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84b5c800 r7:00000000 r6:83018600 r5:00001000 r4:7f029000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfba5000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:855b2f8c r4:856ce400 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:855b2f8c r4:856ce400 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84b5c800 r8:856ce42c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856ce400 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856ce400 r8:80278fec r7:dfbe5e60 r6:856ce480 r5:84b5c800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e5fb0 to 0xdf9e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:856c9b40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:60:4455 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:60 state:D stack:0 pid:4455 tgid:4455 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65250>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a642bc>] (__schedule) from [<81a65250>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:e4219d84 r9:00000002 r8:60000113 r7:829171a0 r6:e4219d8c r5:84876000 r4:84876000 [<81a65224>] (schedule) from [<81a65638>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:84876000 r4:8291719c [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67e98>] (__mutex_lock.constprop.0) from [<81a68990>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4219e08 r4:00000000 [<81a6897c>] (__mutex_lock_slowpath) from [<81a689d0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68994>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854347c0 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84876000 r7:00000000 r6:83018600 r5:00001000 r4:7f041000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea60f000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:855b178c r4:856cd180 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:855b178c r4:856cd180 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84876000 r8:856cd1ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856cd180 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856cd180 r8:80278fec r7:e4215e60 r6:856cd200 r5:84876000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4219fb0 to 0xe4219ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:857799c0 INFO: task kworker/1:60:4455 is blocked on a mutex likely owned by task kworker/1:43:4405. task:kworker/1:43 state:R running task stack:0 pid:4405 tgid:4405 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65684>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:84b5c800 r8:80200c04 r7:df9e5d54 r6:ffffffff r5:84b5c800 r4:00000000 [<81a65644>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdf9e5d20 to 0xdf9e5d68) 5d20: c8252000 eba7b000 00000001 80239bf8 7f027000 00000001 82acb1c4 82aca5a0 5d40: 7f027000 eba7b000 8280c9b4 df9e5d9c df9e5da0 df9e5d70 80230af0 80239c10 5d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9e5dc0 r5:df9e5e08 r4:df9e5dc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85874800 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84b5c800 r7:00000000 r6:83018600 r5:00001000 r4:7f029000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfba5000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:855b2f8c r4:856ce400 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:855b2f8c r4:856ce400 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84b5c800 r8:856ce42c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856ce400 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856ce400 r8:80278fec r7:dfbe5e60 r6:856ce480 r5:84b5c800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e5fb0 to 0xdf9e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:856c9b40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:176:4923 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:176 state:D stack:0 pid:4923 tgid:4923 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65250>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a642bc>] (__schedule) from [<81a65250>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ea7b1d84 r9:00000002 r8:60000113 r7:829171a0 r6:ea7b1d8c r5:85404800 r4:85404800 [<81a65224>] (schedule) from [<81a65638>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:85404800 r4:8291719c [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67e98>] (__mutex_lock.constprop.0) from [<81a68990>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea7b1e08 r4:00000000 [<81a6897c>] (__mutex_lock_slowpath) from [<81a689d0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68994>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857b75c0 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:85404800 r7:00000000 r6:83018400 r5:00001000 r4:7f033000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea573000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:854c9f8c r4:85443300 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:854c9f8c r4:85443300 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85404800 r8:8544332c r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:85443300 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85443300 r8:80278fec r7:ea811e60 r6:85431400 r5:85404800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea7b1fb0 to 0xea7b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85445ec0 INFO: task kworker/0:176:4923 is blocked on a mutex likely owned by task kworker/1:43:4405. task:kworker/1:43 state:R running task stack:0 pid:4405 tgid:4405 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65684>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:84b5c800 r8:80200c04 r7:df9e5d54 r6:ffffffff r5:84b5c800 r4:00000000 [<81a65644>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdf9e5d20 to 0xdf9e5d68) 5d20: c8252000 eba7b000 00000001 80239bf8 7f027000 00000001 82acb1c4 82aca5a0 5d40: 7f027000 eba7b000 8280c9b4 df9e5d9c df9e5da0 df9e5d70 80230af0 80239c10 5d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9e5dc0 r5:df9e5e08 r4:df9e5dc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85874800 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84b5c800 r7:00000000 r6:83018600 r5:00001000 r4:7f029000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfba5000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:855b2f8c r4:856ce400 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:855b2f8c r4:856ce400 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84b5c800 r8:856ce42c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856ce400 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856ce400 r8:80278fec r7:dfbe5e60 r6:856ce480 r5:84b5c800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e5fb0 to 0xdf9e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:856c9b40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:213:5062 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:213 state:D stack:0 pid:5062 tgid:5062 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65250>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a642bc>] (__schedule) from [<81a65250>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ea985d84 r9:00000002 r8:60000113 r7:829171a0 r6:ea985d8c r5:85926000 r4:85926000 [<81a65224>] (schedule) from [<81a65638>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:85926000 r4:8291719c [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67e98>] (__mutex_lock.constprop.0) from [<81a68990>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea985e08 r4:00000000 [<81a6897c>] (__mutex_lock_slowpath) from [<81a689d0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68994>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d8d080 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:85926000 r7:00000000 r6:83018400 r5:00001000 r4:7f02d000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfc89000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:854c9b8c r4:85563b80 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:854c9b8c r4:85563b80 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:85926000 r8:85563bac r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:85563b80 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85563b80 r8:80278fec r7:ea981e60 r6:85563c00 r5:85926000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea985fb0 to 0xea985ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:854364c0 INFO: task kworker/0:213:5062 is blocked on a mutex likely owned by task kworker/1:43:4405. task:kworker/1:43 state:R running task stack:0 pid:4405 tgid:4405 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65684>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:84b5c800 r8:80200c04 r7:df9e5d54 r6:ffffffff r5:84b5c800 r4:00000000 [<81a65644>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdf9e5d20 to 0xdf9e5d68) 5d20: c8252000 eba7b000 00000001 80239bf8 7f027000 00000001 82acb1c4 82aca5a0 5d40: 7f027000 eba7b000 8280c9b4 df9e5d9c df9e5da0 df9e5d70 80230af0 80239c10 5d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9e5dc0 r5:df9e5e08 r4:df9e5dc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85874800 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84b5c800 r7:00000000 r6:83018600 r5:00001000 r4:7f029000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfba5000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:855b2f8c r4:856ce400 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:855b2f8c r4:856ce400 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84b5c800 r8:856ce42c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856ce400 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856ce400 r8:80278fec r7:dfbe5e60 r6:856ce480 r5:84b5c800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e5fb0 to 0xdf9e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:856c9b40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:226:5100 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:226 state:D stack:0 pid:5100 tgid:5100 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65250>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a642bc>] (__schedule) from [<81a65250>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ea9d1d84 r9:00000002 r8:60000113 r7:829171a0 r6:ea9d1d8c r5:858b8000 r4:858b8000 [<81a65224>] (schedule) from [<81a65638>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:858b8000 r4:8291719c [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67e98>] (__mutex_lock.constprop.0) from [<81a68990>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9d1e08 r4:00000000 [<81a6897c>] (__mutex_lock_slowpath) from [<81a689d0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68994>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84eaea80 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:858b8000 r7:00000000 r6:83018400 r5:00001000 r4:7f03f000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea6a1000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:854cb78c r4:85879a80 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:854cb78c r4:85879a80 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:858b8000 r8:85879aac r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:85879a80 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85879a80 r8:80278fec r7:ea971e60 r6:85879b80 r5:858b8000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9d1fb0 to 0xea9d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:858374c0 INFO: task kworker/0:226:5100 is blocked on a mutex likely owned by task kworker/1:43:4405. task:kworker/1:43 state:R running task stack:0 pid:4405 tgid:4405 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65684>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:84b5c800 r8:80200c04 r7:df9e5d54 r6:ffffffff r5:84b5c800 r4:00000000 [<81a65644>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdf9e5d20 to 0xdf9e5d68) 5d20: c8252000 eba7b000 00000001 80239bf8 7f027000 00000001 82acb1c4 82aca5a0 5d40: 7f027000 eba7b000 8280c9b4 df9e5d9c df9e5da0 df9e5d70 80230af0 80239c10 5d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9e5dc0 r5:df9e5e08 r4:df9e5dc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85874800 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84b5c800 r7:00000000 r6:83018600 r5:00001000 r4:7f029000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfba5000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:855b2f8c r4:856ce400 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:855b2f8c r4:856ce400 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84b5c800 r8:856ce42c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856ce400 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856ce400 r8:80278fec r7:dfbe5e60 r6:856ce480 r5:84b5c800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e5fb0 to 0xdf9e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:856c9b40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:230:5107 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:230 state:D stack:0 pid:5107 tgid:5107 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65250>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a642bc>] (__schedule) from [<81a65250>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ea9c1d84 r9:00000002 r8:60000113 r7:829171a0 r6:ea9c1d8c r5:858bbc00 r4:858bbc00 [<81a65224>] (schedule) from [<81a65638>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:858bbc00 r4:8291719c [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67e98>] (__mutex_lock.constprop.0) from [<81a68990>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9c1e08 r4:00000000 [<81a6897c>] (__mutex_lock_slowpath) from [<81a689d0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68994>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d89380 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:858bbc00 r7:00000000 r6:83018400 r5:00001000 r4:7f02b000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfc2f000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:854c978c r4:85879f00 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:854c978c r4:85879f00 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:858bbc00 r8:85879f2c r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:85879f00 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85879f00 r8:80278fec r7:ea9c5e60 r6:85879f80 r5:858bbc00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9c1fb0 to 0xea9c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85880ac0 INFO: task kworker/0:230:5107 is blocked on a mutex likely owned by task kworker/1:43:4405. task:kworker/1:43 state:R running task stack:0 pid:4405 tgid:4405 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65684>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:84b5c800 r8:80200c04 r7:df9e5d54 r6:ffffffff r5:84b5c800 r4:00000000 [<81a65644>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdf9e5d20 to 0xdf9e5d68) 5d20: c8252000 eba7b000 00000001 80239bf8 7f027000 00000001 82acb1c4 82aca5a0 5d40: 7f027000 eba7b000 8280c9b4 df9e5d9c df9e5da0 df9e5d70 80230af0 80239c10 5d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9e5dc0 r5:df9e5e08 r4:df9e5dc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85874800 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84b5c800 r7:00000000 r6:83018600 r5:00001000 r4:7f029000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfba5000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:855b2f8c r4:856ce400 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:855b2f8c r4:856ce400 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84b5c800 r8:856ce42c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856ce400 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856ce400 r8:80278fec r7:dfbe5e60 r6:856ce480 r5:84b5c800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e5fb0 to 0xdf9e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:856c9b40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:233:5113 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:233 state:D stack:0 pid:5113 tgid:5113 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65250>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a642bc>] (__schedule) from [<81a65250>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:eaa01d84 r9:00000002 r8:60000113 r7:829171a0 r6:eaa01d8c r5:858bd400 r4:858bd400 [<81a65224>] (schedule) from [<81a65638>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:858bd400 r4:8291719c [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a65620>] (schedule_preempt_disabled) from [<81a681e8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a67e98>] (__mutex_lock.constprop.0) from [<81a68990>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa01e08 r4:00000000 [<81a6897c>] (__mutex_lock_slowpath) from [<81a689d0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a68994>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8543ad80 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:858bd400 r7:00000000 r6:83018400 r5:00001000 r4:7f037000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:e010d000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:854ca38c r4:8587e280 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:854ca38c r4:8587e280 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:858bd400 r8:8587e2ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:8587e280 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8587e280 r8:80278fec r7:ea9fde60 r6:8587e300 r5:858bd400 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa01fb0 to 0xeaa01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:85439d00 INFO: task kworker/0:233:5113 is blocked on a mutex likely owned by task kworker/1:43:4405. task:kworker/1:43 state:R running task stack:0 pid:4405 tgid:4405 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642bc>] (__schedule) from [<81a65684>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:84b5c800 r8:80200c04 r7:df9e5d54 r6:ffffffff r5:84b5c800 r4:00000000 [<81a65644>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xdf9e5d20 to 0xdf9e5d68) 5d20: cec3e000 eba7b000 00000001 80239bf8 7f027000 00000001 82acb1c4 82aca5a0 5d40: 7f027000 eba7b000 8280c9b4 df9e5d9c df9e5da0 df9e5d70 80230af0 80239c10 5d60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9e5dc0 r5:df9e5e08 r4:df9e5dc0 [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85874800 r4:00000000 [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84b5c800 r7:00000000 r6:83018600 r5:00001000 r4:7f029000 [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:dfba5000 [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:855b2f8c r4:856ce400 [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:ddde3d80 r6:83018600 r5:855b2f8c r4:856ce400 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84b5c800 r8:856ce42c r7:82804d40 r6:ddde3d80 r5:ddde3da0 r4:856ce400 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:856ce400 r8:80278fec r7:dfbe5e60 r6:856ce480 r5:84b5c800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e5fb0 to 0xdf9e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:856c9b40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 30 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT Hardware name: ARM-Versatile Express Call trace: [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c arch/arm/kernel/traps.c:257) r7:00000000 r6:00000113 r5:60000193 r4:82252738 [<80201b08>] (show_stack) from [<8021f8f8>] (__dump_stack lib/dump_stack.c:94 [inline]) [<80201b08>] (show_stack) from [<8021f8f8>] (dump_stack_lvl+0x70/0x7c lib/dump_stack.c:120) [<8021f888>] (dump_stack_lvl) from [<8021f91c>] (dump_stack+0x18/0x1c lib/dump_stack.c:129) r5:00000001 r4:00000001 [<8021f904>] (dump_stack) from [<81a4ded4>] (nmi_cpu_backtrace+0x160/0x17c lib/nmi_backtrace.c:113) [<81a4dd74>] (nmi_cpu_backtrace) from [<81a4e020>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8 lib/nmi_backtrace.c:62) r7:00000001 r6:8280c690 r5:8281ae34 r4:ffffffff [<81a4def0>] (nmi_trigger_cpumask_backtrace) from [<802304fc>] (arch_trigger_cpumask_backtrace+0x18/0x1c arch/arm/kernel/smp.c:852) r9:8281ba28 r8:8280c810 r7:00029557 r6:00007b93 r5:82abf7d4 r4:85d3820c [<802304e4>] (arch_trigger_cpumask_backtrace) from [<8037faf0>] (trigger_all_cpu_backtrace include/linux/nmi.h:160 [inline]) [<802304e4>] (arch_trigger_cpumask_backtrace) from [<8037faf0>] (check_hung_uninterruptible_tasks kernel/hung_task.c:332 [inline]) [<802304e4>] (arch_trigger_cpumask_backtrace) from [<8037faf0>] (watchdog+0x5d0/0x850 kernel/hung_task.c:495) [<8037f520>] (watchdog) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:00000000 r8:8037f520 r7:830cfd80 r6:830cfd80 r5:8321c800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf8d9fb0 to 0xdf8d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:833cb7c0 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 2820 Comm: pr/ttyAMA-1 Not tainted syzkaller #0 PREEMPT Hardware name: ARM-Versatile Express PC is at __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:152 [inline] PC is at _raw_spin_unlock_irqrestore+0x28/0x54 kernel/locking/spinlock.c:194 LR is at spin_unlock_irqrestore include/linux/spinlock.h:406 [inline] LR is at __uart_port_unlock_irqrestore include/linux/serial_core.h:616 [inline] LR is at pl011_console_device_unlock+0x20/0x24 drivers/tty/serial/amba-pl011.c:2603 pc : [<81a6e124>] lr : [<80a8f468>] psr: 60000113 sp : eaeb9eb0 ip : eaeb9ec0 fp : eaeb9ebc r10: 82959594 r9 : 00000000 r8 : 00000000 r7 : 00000117 r6 : 829594f8 r5 : 00000000 r4 : 00000001 r3 : 00000ba8 r2 : 00000000 r1 : 60000113 r0 : 83b5e840 Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user Control: 30c5387d Table: 84d2e080 DAC: fffffffd Call trace: [<81a6e0fc>] (_raw_spin_unlock_irqrestore) from [<80a8f468>] (spin_unlock_irqrestore include/linux/spinlock.h:406 [inline]) [<81a6e0fc>] (_raw_spin_unlock_irqrestore) from [<80a8f468>] (__uart_port_unlock_irqrestore include/linux/serial_core.h:616 [inline]) [<81a6e0fc>] (_raw_spin_unlock_irqrestore) from [<80a8f468>] (pl011_console_device_unlock+0x20/0x24 drivers/tty/serial/amba-pl011.c:2603) [<80a8f448>] (pl011_console_device_unlock) from [<802e3750>] (nbcon_emit_one+0x88/0x100 kernel/printk/nbcon.c:1142) [<802e36c8>] (nbcon_emit_one) from [<802e3970>] (nbcon_kthread_func+0x1a8/0x2a4 kernel/printk/nbcon.c:1229) r6:8280c690 r5:84148c00 r4:829594f8 [<802e37c8>] (nbcon_kthread_func) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:829594f8 r8:802e37c8 r7:84a77780 r6:84a77780 r5:84148c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:84176380