INFO: task kworker/0:61:4931 blocked for more than 431 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:61 state:D stack:0 pid:4931 tgid:4931 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81ab22ec>] (__schedule) from [<81ab3598>] (__schedule_loop kernel/sched/core.c:6945 [inline]) [<81ab22ec>] (__schedule) from [<81ab3598>] (schedule+0x2c/0x130 kernel/sched/core.c:6960) r10:e027dd84 r9:829174e8 r8:60000013 r7:829174e8 r6:e027dd8c r5:85f73000 r4:85f73000 [<81ab356c>] (schedule) from [<81ab3720>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7017) r5:85f73000 r4:829174e4 [<81ab3708>] (schedule_preempt_disabled) from [<81ab6da4>] (__mutex_lock_common kernel/locking/mutex.c:692 [inline]) [<81ab3708>] (schedule_preempt_disabled) from [<81ab6da4>] (__mutex_lock.constprop.0+0x658/0xf8c kernel/locking/mutex.c:776) [<81ab674c>] (__mutex_lock.constprop.0) from [<81ab77ac>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1065) r10:8280c9e4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e027de08 r4:00000000 [<81ab7798>] (__mutex_lock_slowpath) from [<81ab77ec>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:290) [<81ab77b0>] (mutex_lock) from [<804f4400>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2944) [<804f4398>] (_vm_unmap_aliases) from [<804f81e8>] (vm_reset_perms mm/vmalloc.c:3375 [inline]) [<804f4398>] (_vm_unmap_aliases) from [<804f81e8>] (vfree+0x16c/0x210 mm/vmalloc.c:3454) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8668c0c0 r4:00000000 [<804f807c>] (vfree) from [<80564020>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:85f73000 r7:00000000 r6:83018400 r5:00001000 r4:7f2d8000 [<80563ff0>] (execmem_free) from [<803cb2cc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1068) r5:00001000 r4:eaedf000 [<803cb2bc>] (bpf_jit_free_exec) from [<803cb6ac>] (bpf_jit_binary_free kernel/bpf/core.c:1114 [inline]) [<803cb2bc>] (bpf_jit_free_exec) from [<803cb6ac>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1237) [<803cb644>] (bpf_jit_free) from [<803cc7d4>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2935) r5:86981794 r4:85db4000 [<803cc694>] (bpf_prog_free_deferred) from [<80275db8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3257) r7:dddcfb40 r6:83018400 r5:86981794 r4:85db4000 [<80275c04>] (process_one_work) from [<802764f8>] (process_scheduled_works kernel/workqueue.c:3340 [inline]) [<80275c04>] (process_one_work) from [<802764f8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3421) r10:61c88647 r9:85f73000 r8:85db402c r7:82804d80 r6:dddcfb40 r5:dddcfb60 r4:85db4000 [<802762fc>] (worker_thread) from [<8027f6fc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85db4000 r8:802762fc r7:e0261e60 r6:85db4d00 r5:85f73000 r4:00000001 [<8027f5d0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe027dfb0 to 0xe027dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f5d0 r4:86573f80 INFO: task kworker/0:61:4931 is blocked on a mutex likely owned by task kworker/1:96:5620. task:kworker/1:96 state:R running task stack:0 pid:5620 tgid:5620 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81ab22ec>] (__schedule) from [<81ab39cc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7190) r10:8280ca38 r9:84c16000 r8:80200c04 r7:ea661d54 r6:ffffffff r5:84c16000 r4:00000000 [<81ab398c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea661d20 to 0xea661d68) 1d20: 9ade9000 eb949000 00000001 80239018 7f292000 00000001 82ace204 82acd5e0 1d40: 7f292000 eb949000 8280ca38 ea661d9c ea661da0 ea661d70 8022fe10 80239030 1d60: 80000013 ffffffff r5:80000013 r4:80239030 [<8022fdac>] (flush_tlb_kernel_range) from [<804f41c4>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2369) r4:82ace224 [<804f3f40>] (__purge_vmap_area_lazy) from [<804f457c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2983) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea661dc0 r5:ea661e08 r4:ea661dc0 [<804f4398>] (_vm_unmap_aliases) from [<804f81e8>] (vm_reset_perms mm/vmalloc.c:3375 [inline]) [<804f4398>] (_vm_unmap_aliases) from [<804f81e8>] (vfree+0x16c/0x210 mm/vmalloc.c:3454) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86473a80 r4:00000000 [<804f807c>] (vfree) from [<80564020>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84c16000 r7:00000000 r6:83018600 r5:00001000 r4:7f292000 [<80563ff0>] (execmem_free) from [<803cb2cc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1068) r5:00001000 r4:dfdcb000 [<803cb2bc>] (bpf_jit_free_exec) from [<803cb6ac>] (bpf_jit_binary_free kernel/bpf/core.c:1114 [inline]) [<803cb2bc>] (bpf_jit_free_exec) from [<803cb6ac>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1237) [<803cb644>] (bpf_jit_free) from [<803cc7d4>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2935) r5:8668bb94 r4:86572400 [<803cc694>] (bpf_prog_free_deferred) from [<80275db8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3257) r7:ddde3b40 r6:83018600 r5:8668bb94 r4:86572400 [<80275c04>] (process_one_work) from [<802764f8>] (process_scheduled_works kernel/workqueue.c:3340 [inline]) [<80275c04>] (process_one_work) from [<802764f8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3421) r10:61c88647 r9:84c16000 r8:8657242c r7:82804d80 r6:ddde3b40 r5:ddde3b60 r4:86572400 [<802762fc>] (worker_thread) from [<8027f6fc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:86572400 r8:802762fc r7:ea4c5e60 r6:86572f80 r5:84c16000 r4:00000001 [<8027f5d0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea661fb0 to 0xea661ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f5d0 r4:864ee3c0 INFO: task kworker/0:67:5023 blocked for more than 443 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:67 state:D stack:0 pid:5023 tgid:5023 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81ab22ec>] (__schedule) from [<81ab3598>] (__schedule_loop kernel/sched/core.c:6945 [inline]) [<81ab22ec>] (__schedule) from [<81ab3598>] (schedule+0x2c/0x130 kernel/sched/core.c:6960) r10:ea799d84 r9:829174e8 r8:60000113 r7:829174e8 r6:ea799d8c r5:86aa2400 r4:86aa2400 [<81ab356c>] (schedule) from [<81ab3720>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7017) r5:86aa2400 r4:829174e4 [<81ab3708>] (schedule_preempt_disabled) from [<81ab6da4>] (__mutex_lock_common kernel/locking/mutex.c:692 [inline]) [<81ab3708>] (schedule_preempt_disabled) from [<81ab6da4>] (__mutex_lock.constprop.0+0x658/0xf8c kernel/locking/mutex.c:776) [<81ab674c>] (__mutex_lock.constprop.0) from [<81ab77ac>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1065) r10:8280c9e4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea799e08 r4:00000000 [<81ab7798>] (__mutex_lock_slowpath) from [<81ab77ec>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:290) [<81ab77b0>] (mutex_lock) from [<804f4400>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2944) [<804f4398>] (_vm_unmap_aliases) from [<804f81e8>] (vm_reset_perms mm/vmalloc.c:3375 [inline]) [<804f4398>] (_vm_unmap_aliases) from [<804f81e8>] (vfree+0x16c/0x210 mm/vmalloc.c:3454) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e41a80 r4:00000000 [<804f807c>] (vfree) from [<80564020>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:86aa2400 r7:00000000 r6:83018400 r5:00001000 r4:7f2d6000 [<80563ff0>] (execmem_free) from [<803cb2cc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1068) r5:00001000 r4:eaed5000 [<803cb2bc>] (bpf_jit_free_exec) from [<803cb6ac>] (bpf_jit_binary_free kernel/bpf/core.c:1114 [inline]) [<803cb2bc>] (bpf_jit_free_exec) from [<803cb6ac>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1237) [<803cb644>] (bpf_jit_free) from [<803cc7d4>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2935) r5:86981b94 r4:853b4800 [<803cc694>] (bpf_prog_free_deferred) from [<80275db8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3257) r7:dddcfb40 r6:83018400 r5:86981b94 r4:853b4800 [<80275c04>] (process_one_work) from [<802764f8>] (process_scheduled_works kernel/workqueue.c:3340 [inline]) [<80275c04>] (process_one_work) from [<802764f8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3421) r10:61c88647 r9:86aa2400 r8:853b482c r7:82804d80 r6:dddcfb40 r5:dddcfb60 r4:853b4800 [<802762fc>] (worker_thread) from [<8027f6fc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:853b4800 r8:802762fc r7:e0261e60 r6:853b4300 r5:86aa2400 r4:00000001 [<8027f5d0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea799fb0 to 0xea799ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f5d0 r4:865694c0 INFO: task kworker/0:67:5023 is blocked on a mutex likely owned by task kworker/1:96:5620. task:kworker/1:96 state:R running task stack:0 pid:5620 tgid:5620 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81ab22ec>] (__schedule) from [<81ab39cc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7190) r10:8280ca38 r9:84c16000 r8:80200c04 r7:ea661d54 r6:ffffffff r5:84c16000 r4:00000000 [<81ab398c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea661d20 to 0xea661d68) 1d20: 9de57000 eb949000 00000001 80239018 7f292000 00000001 82ace204 82acd5e0 1d40: 7f292000 eb949000 8280ca38 ea661d9c ea661da0 ea661d70 8022fe10 80239030 1d60: 80000013 ffffffff r5:80000013 r4:80239030 [<8022fdac>] (flush_tlb_kernel_range) from [<804f41c4>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2369) r4:82ace224 [<804f3f40>] (__purge_vmap_area_lazy) from [<804f457c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2983) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea661dc0 r5:ea661e08 r4:ea661dc0 [<804f4398>] (_vm_unmap_aliases) from [<804f81e8>] (vm_reset_perms mm/vmalloc.c:3375 [inline]) [<804f4398>] (_vm_unmap_aliases) from [<804f81e8>] (vfree+0x16c/0x210 mm/vmalloc.c:3454) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86473a80 r4:00000000 [<804f807c>] (vfree) from [<80564020>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018605 r8:84c16000 r7:00000000 r6:83018600 r5:00001000 r4:7f292000 [<80563ff0>] (execmem_free) from [<803cb2cc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1068) r5:00001000 r4:dfdcb000 [<803cb2bc>] (bpf_jit_free_exec) from [<803cb6ac>] (bpf_jit_binary_free kernel/bpf/core.c:1114 [inline]) [<803cb2bc>] (bpf_jit_free_exec) from [<803cb6ac>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1237) [<803cb644>] (bpf_jit_free) from [<803cc7d4>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2935) r5:8668bb94 r4:86572400 [<803cc694>] (bpf_prog_free_deferred) from [<80275db8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3257) r7:ddde3b40 r6:83018600 r5:8668bb94 r4:86572400 [<80275c04>] (process_one_work) from [<802764f8>] (process_scheduled_works kernel/workqueue.c:3340 [inline]) [<80275c04>] (process_one_work) from [<802764f8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3421) r10:61c88647 r9:84c16000 r8:8657242c r7:82804d80 r6:ddde3b40 r5:ddde3b60