INFO: task kworker/0:17:30302 blocked for more than 430 seconds. Tainted: G L syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:17 state:D stack:0 pid:30302 tgid:30302 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81aa9bbc>] (__schedule) from [<81aaae4c>] (__schedule_loop kernel/sched/core.c:6949 [inline]) [<81aa9bbc>] (__schedule) from [<81aaae4c>] (schedule+0x2c/0x134 kernel/sched/core.c:6964) r10:dfb9dd84 r9:00000000 r8:60000013 r7:dfb9dd8c r6:829172e8 r5:83ec0c00 r4:83ec0c00 [<81aaae20>] (schedule) from [<81aaafd8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7021) r5:83ec0c00 r4:829172e4 [<81aaafc0>] (schedule_preempt_disabled) from [<81aae5a0>] (__mutex_lock_common kernel/locking/mutex.c:692 [inline]) [<81aaafc0>] (schedule_preempt_disabled) from [<81aae5a0>] (__mutex_lock.constprop.0+0x584/0xf10 kernel/locking/mutex.c:776) [<81aae01c>] (__mutex_lock.constprop.0) from [<81aaf000>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1065) r10:8280c7e4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb9de08 r4:00000000 [<81aaefec>] (__mutex_lock_slowpath) from [<81aaf040>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:290) [<81aaf004>] (mutex_lock) from [<804f0fc8>] (_vm_unmap_aliases+0x5c/0x238 mm/vmalloc.c:2944) [<804f0f6c>] (_vm_unmap_aliases) from [<804f4cac>] (vm_reset_perms mm/vmalloc.c:3375 [inline]) [<804f0f6c>] (_vm_unmap_aliases) from [<804f4cac>] (vfree+0x16c/0x210 mm/vmalloc.c:3454) r10:83018405 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:862440c0 r4:00000000 [<804f4b40>] (vfree) from [<805607dc>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83016170 r8:83ec0c00 r7:00000000 r6:83018400 r5:00001000 r4:7f22e000 [<805607ac>] (execmem_free) from [<803ca91c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1068) r5:00001000 r4:e02af000 [<803ca90c>] (bpf_jit_free_exec) from [<803cacfc>] (bpf_jit_binary_free kernel/bpf/core.c:1114 [inline]) [<803ca90c>] (bpf_jit_free_exec) from [<803cacfc>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1237) [<803cac98>] (bpf_jit_free) from [<803cbc1c>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2935) r5:85f21794 r4:85a67380 [<803cbadc>] (bpf_prog_free_deferred) from [<80276cec>] (process_one_work+0x1b8/0x4f8 kernel/workqueue.c:3257) r7:dddcfb40 r6:83018400 r5:85f21794 r4:85a67380 [<80276b34>] (process_one_work) from [<8027796c>] (process_scheduled_works kernel/workqueue.c:3340 [inline]) [<80276b34>] (process_one_work) from [<8027796c>] (worker_thread+0x1c4/0x394 kernel/workqueue.c:3421) r10:61c88647 r9:83ec0c00 r8:82804d80 r7:85a673ac r6:dddcfb40 r5:dddcfb60 r4:85a67380 [<802777a8>] (worker_thread) from [<8027facc>] (kthread+0x128/0x27c kernel/kthread.c:463) r10:00000000 r9:85a67380 r8:802777a8 r7:df971e68 r6:85a67700 r5:83ec0c00 r4:00000001 [<8027f9a4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb9dfb0 to 0xdfb9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f9a4 r4:86274ac0 INFO: task kworker/0:17:30302 is blocked on a mutex likely owned by task kworker/1:46:6906. task:kworker/1:46 state:R running task stack:0 pid:6906 tgid:6906 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81aa9bbc>] (__schedule) from [<81aab284>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7194) r10:8280c838 r9:83ef3000 r8:80200c04 r7:ea839d5c r6:ffffffff r5:83ef3000 r4:00000000 [<81aab244>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xea839d28 to 0xea839d70) 9d20: 8df29000 ea88b000 00000001 802394d0 82ace620 82acf264 9d40: 7f00d000 ea88b000 00000000 00000001 8280c838 ea839d9c ea88b000 ea839d78 9d60: 8023043c 802394e8 80000113 ffffffff r5:80000113 r4:802394e8 [<802303dc>] (flush_tlb_kernel_range) from [<804f0d7c>] (__purge_vmap_area_lazy+0x260/0x450 mm/vmalloc.c:2369) [<804f0b1c>] (__purge_vmap_area_lazy) from [<804f1154>] (_vm_unmap_aliases+0x1e8/0x238 mm/vmalloc.c:2983) r10:00000000 r9:ea839dc0 r8:00000000 r7:ffffffff r6:00000008 r5:ea839e08 r4:ea839dc0 [<804f0f6c>] (_vm_unmap_aliases) from [<804f4cac>] (vm_reset_perms mm/vmalloc.c:3375 [inline]) [<804f0f6c>] (_vm_unmap_aliases) from [<804f4cac>] (vfree+0x16c/0x210 mm/vmalloc.c:3454) r10:83018605 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:861a1880 r4:00000000 [<804f4b40>] (vfree) from [<805607dc>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83016170 r8:83ef3000 r7:00000000 r6:83018600 r5:00001000 r4:7f003000 [<805607ac>] (execmem_free) from [<803ca91c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1068) r5:00001000 r4:dfd95000 [<803ca90c>] (bpf_jit_free_exec) from [<803cacfc>] (bpf_jit_binary_free kernel/bpf/core.c:1114 [inline]) [<803ca90c>] (bpf_jit_free_exec) from [<803cacfc>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1237) [<803cac98>] (bpf_jit_free) from [<803cbc1c>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2935) r5:8652f794 r4:86243000 [<803cbadc>] (bpf_prog_free_deferred) from [<80276cec>] (process_one_work+0x1b8/0x4f8 kernel/workqueue.c:3257) r7:ddde3b40 r6:83018600 r5:8652f794 r4:86243000 [<80276b34>] (process_one_work) from [<8027796c>] (process_scheduled_works kernel/workqueue.c:3340 [inline]) [<80276b34>] (process_one_work) from [<8027796c>] (worker_thread+0x1c4/0x394 kernel/workqueue.c:3421) r10:61c88647 r9:83ef3000 r8:82804d80 r7:8624302c r6:ddde3b40 r5:ddde3b60 r4:86243000 [<802777a8>] (worker_thread) from [<8027facc>] (kthread+0x128/0x27c kernel/kthread.c:463) r10:00000000 r9:86243000 r8:802777a8 r7:dfcb5e68 r6:86243b00 r5:83ef3000 r4:00000001 [<8027f9a4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea839fb0 to 0xea839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f9a4 r4:85dc26c0 NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 30 Comm: khungtaskd Tainted: G L syzkaller #0 PREEMPT Tainted: [L]=SOFTLOCKUP Hardware name: ARM-Versatile Express Call trace: [<80201a40>] (dump_backtrace) from [<80201b34>] (show_stack+0x18/0x1c arch/arm/kernel/traps.c:257) r7:600e0193 r6:600e0193 r5:822a2694 r4:00000000 [<80201b1c>] (show_stack) from [<8021ed6c>] (__dump_stack lib/dump_stack.c:94 [inline]) [<80201b1c>] (show_stack) from [<8021ed6c>] (dump_stack_lvl+0x5c/0x70 lib/dump_stack.c:120) [<8021ed10>] (dump_stack_lvl) from [<8021ed98>] (dump_stack+0x18/0x1c lib/dump_stack.c:129) r7:00000000 r6:000e0113 r5:00000000 r4:00000001 [<8021ed80>] (dump_stack) from [<81a937fc>] (nmi_cpu_backtrace+0x150/0x170 lib/nmi_backtrace.c:113) [<81a936ac>] (nmi_cpu_backtrace) from [<81a9394c>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8 lib/nmi_backtrace.c:62) r7:00000000 r6:8280c510 r5:8281ad9c r4:ffffffff [<81a9381c>] (nmi_trigger_cpumask_backtrace) from [<8022fe60>] (arch_trigger_cpumask_backtrace+0x18/0x1c arch/arm/kernel/smp.c:852) r9:82ac382c r8:8280c690 r7:82804d80 r6:83ec13f0 r5:00007ebc r4:00000048 [<8022fe48>] (arch_trigger_cpumask_backtrace) from [<81a9b430>] (trigger_all_cpu_backtrace include/linux/nmi.h:161 [inline]) [<8022fe48>] (arch_trigger_cpumask_backtrace) from [<81a9b430>] (__sys_info lib/sys_info.c:157 [inline]) [<8022fe48>] (arch_trigger_cpumask_backtrace) from [<81a9b430>] (sys_info+0x68/0xa8 lib/sys_info.c:165) [<81a9b3c8>] (sys_info) from [<80382f6c>] (check_hung_uninterruptible_tasks kernel/hung_task.c:346 [inline]) [<81a9b3c8>] (sys_info) from [<80382f6c>] (watchdog+0x458/0x888 kernel/hung_task.c:515) r5:00007ebc r4:85bacb0c [<80382b14>] (watchdog) from [<8027facc>] (kthread+0x128/0x27c kernel/kthread.c:463) r10:00000000 r9:00000000 r8:80382b14 r7:832a2300 r6:832a2300 r5:832e9800 r4:00000001 [<8027f9a4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf8d9fb0 to 0xdf8d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f9a4 r4:8334a240 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 2815 Comm: pr/ttyAMA-1 Tainted: G L syzkaller #0 PREEMPT Tainted: [L]=SOFTLOCKUP Hardware name: ARM-Versatile Express PC is at __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:152 [inline] PC is at _raw_spin_unlock_irqrestore+0x28/0x54 kernel/locking/spinlock.c:194 LR is at spin_unlock_irqrestore include/linux/spinlock.h:406 [inline] LR is at __uart_port_unlock_irqrestore include/linux/serial_core.h:616 [inline] LR is at pl011_console_device_unlock+0x20/0x24 drivers/tty/serial/amba-pl011.c:2603 pc : [<81ab4a90>] lr : [<80aa4664>] psr: 60000013 sp : eb005eb0 ip : eb005ec0 fp : eb005ebc r10: 8295971c r9 : 00000001 r8 : 00000000 r7 : 00000117 r6 : 82959680 r5 : 00000000 r4 : 00000001 r3 : 00004d73 r2 : 00000000 r1 : 60000013 r0 : 846ae840 Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none Control: 30c5387d Table: 858bc100 DAC: 00000000 Call trace: [<81ab4a68>] (_raw_spin_unlock_irqrestore) from [<80aa4664>] (spin_unlock_irqrestore include/linux/spinlock.h:406 [inline]) [<81ab4a68>] (_raw_spin_unlock_irqrestore) from [<80aa4664>] (__uart_port_unlock_irqrestore include/linux/serial_core.h:616 [inline]) [<81ab4a68>] (_raw_spin_unlock_irqrestore) from [<80aa4664>] (pl011_console_device_unlock+0x20/0x24 drivers/tty/serial/amba-pl011.c:2603) [<80aa4644>] (pl011_console_device_unlock) from [<802e50b0>] (nbcon_emit_one+0x88/0x100 kernel/printk/nbcon.c:1149) [<802e5028>] (nbcon_emit_one) from [<802e5330>] (nbcon_kthread_func+0x208/0x2ec kernel/printk/nbcon.c:1255) r6:82ac0104 r5:82959680 r4:83ef0000 [<802e5128>] (nbcon_kthread_func) from [<8027facc>] (kthread+0x128/0x27c kernel/kthread.c:463) r10:00000000 r9:82959680 r8:802e5128 r7:84b1ca80 r6:84b1ca80 r5:83ef0000 r4:00000001 [<8027f9a4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb005fb0 to 0xeb005ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f9a4 r4:84b1b200