INFO: task kworker/1:11:22164 blocked for more than 430 seconds. Tainted: G L syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:11 state:D stack:0 pid:22164 tgid:22164 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81aaf6f0>] (__schedule) from [<81ab0a68>] (__schedule_loop kernel/sched/core.c:6989 [inline]) [<81aaf6f0>] (__schedule) from [<81ab0a68>] (schedule+0x2c/0x134 kernel/sched/core.c:7004) r10:e00e1d9c r9:00000000 r8:60000013 r7:e00e1da4 r6:829177b4 r5:865e1800 r4:865e1800 [<81ab0a3c>] (schedule) from [<81ab0bf4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7061) r5:865e1800 r4:829177b0 [<81ab0bdc>] (schedule_preempt_disabled) from [<81ab41b0>] (__mutex_lock_common kernel/locking/mutex.c:692 [inline]) [<81ab0bdc>] (schedule_preempt_disabled) from [<81ab41b0>] (__mutex_lock.constprop.0+0x584/0xf10 kernel/locking/mutex.c:776) [<81ab3c2c>] (__mutex_lock.constprop.0) from [<81ab4c10>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1065) r10:8280c824 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00e1e20 r4:00000000 [<81ab4bfc>] (__mutex_lock_slowpath) from [<81ab4c50>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:290) [<81ab4c14>] (mutex_lock) from [<804f306c>] (_vm_unmap_aliases+0x5c/0x238 mm/vmalloc.c:2944) [<804f3010>] (_vm_unmap_aliases) from [<804f6d54>] (vm_reset_perms mm/vmalloc.c:3375 [inline]) [<804f3010>] (_vm_unmap_aliases) from [<804f6d54>] (vfree+0x16c/0x210 mm/vmalloc.c:3454) r10:83018605 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86a42d40 r4:00000000 [<804f6be8>] (vfree) from [<80562ac0>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83016170 r8:865e1800 r7:00000000 r6:83018600 r5:00001000 r4:7f31a000 [<80562a90>] (execmem_free) from [<803c946c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:ea40d000 [<803c945c>] (bpf_jit_free_exec) from [<803c984c>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803c945c>] (bpf_jit_free_exec) from [<803c984c>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803c97e8>] (bpf_jit_free) from [<803ca780>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2941) r5:86d25394 r4:86d25394 [<803ca638>] (bpf_prog_free_deferred) from [<80276280>] (process_one_work+0x1b8/0x4fc kernel/workqueue.c:3257) r7:ddde3bc0 r6:83018600 r5:86d25394 r4:86cdc400 [<802760c8>] (process_one_work) from [<80276f04>] (process_scheduled_works kernel/workqueue.c:3340 [inline]) [<802760c8>] (process_one_work) from [<80276f04>] (worker_thread+0x1c4/0x394 kernel/workqueue.c:3421) r10:61c88647 r9:865e1800 r8:82804d80 r7:86cdc42c r6:ddde3bc0 r5:ddde3be0 r4:86cdc400 [<80276d40>] (worker_thread) from [<8027f254>] (kthread+0x118/0x138 kernel/kthread.c:467) r10:00000000 r9:86cdc400 r8:80276d40 r7:eb071e80 r6:865e1800 r5:87593700 r4:888a4100 [<8027f13c>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00e1fb0 to 0xe00e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f13c r4:888a4100 INFO: task kworker/1:11:22164 is blocked on a mutex likely owned by task kworker/1:30:12171. task:kworker/1:30 state:R running task stack:0 pid:12171 tgid:12171 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81aaf6f0>] (__schedule) from [<81ab0ea0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7234) r10:8280c878 r9:8462a400 r8:80200c04 r7:e8331d74 r6:ffffffff r5:8462a400 r4:00000000 [<81ab0e60>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xe8331d40 to 0xe8331d88) 1d40: e9849000 ecc8a000 00000000 80239550 82acf620 82ad0264 7f28e000 ecc8a000 1d60: 00000000 00000001 8280c878 e8331db4 ecc8a000 e8331d90 802304bc 80239568 1d80: 80000113 ffffffff r5:80000113 r4:80239568 [<8023045c>] (flush_tlb_kernel_range) from [<804f2e20>] (__purge_vmap_area_lazy+0x260/0x450 mm/vmalloc.c:2369) [<804f2bc0>] (__purge_vmap_area_lazy) from [<804f31f8>] (_vm_unmap_aliases+0x1e8/0x238 mm/vmalloc.c:2983) r10:00000000 r9:e8331dd8 r8:00000000 r7:ffffffff r6:00000008 r5:e8331e20 r4:e8331dd8 [<804f3010>] (_vm_unmap_aliases) from [<804f6d54>] (vm_reset_perms mm/vmalloc.c:3375 [inline]) [<804f3010>] (_vm_unmap_aliases) from [<804f6d54>] (vfree+0x16c/0x210 mm/vmalloc.c:3454) r10:83018605 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8759cf00 r4:00000000 [<804f6be8>] (vfree) from [<80562ac0>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83016170 r8:8462a400 r7:00000000 r6:83018600 r5:00001000 r4:7f260000 [<80562a90>] (execmem_free) from [<803c946c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1071) r5:00001000 r4:dfb90000 [<803c945c>] (bpf_jit_free_exec) from [<803c984c>] (bpf_jit_binary_free kernel/bpf/core.c:1117 [inline]) [<803c945c>] (bpf_jit_free_exec) from [<803c984c>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1240) [<803c97e8>] (bpf_jit_free) from [<803ca780>] (bpf_prog_free_deferred+0x148/0x160 kernel/bpf/core.c:2941) r5:85884b94 r4:85884b94 [<803ca638>] (bpf_prog_free_deferred) from [<80276280>] (process_one_work+0x1b8/0x4fc kernel/workqueue.c:3257) r7:ddde3bc0 r6:83018600 r5:85884b94 r4:86bbb600 [<802760c8>] (process_one_work) from [<80276f04>] (process_scheduled_works kernel/workqueue.c:3340 [inline]) [<802760c8>] (process_one_work) from [<80276f04>] (worker_thread+0x1c4/0x394 kernel/workqueue.c:3421) r10:61c88647 r9:8462a400 r8:82804d80 r7:86bbb62c r6:ddde3bc0 r5:ddde3be0 r4:86bbb600 [<80276d40>] (worker_thread) from [<8027f254>] (kthread+0x118/0x138 kernel/kthread.c:467) r10:00000000 r9:86bbb600 r8:80276d40 r7:ea4e1e80 r6:8462a400 r5:86bc9500 r4:86a28ec0 [<8027f13c>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8331fb0 to 0xe8331ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f13c r4:86a28ec0 NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 29 Comm: khungtaskd Tainted: G L syzkaller #0 PREEMPT Tainted: [L]=SOFTLOCKUP Hardware name: ARM-Versatile Express Call trace: [<802019e8>] (dump_backtrace) from [<80201adc>] (show_stack+0x18/0x1c arch/arm/kernel/traps.c:257) r7:60000093 r6:60000093 r5:8229f228 r4:00000000 [<80201ac4>] (show_stack) from [<8021ee20>] (__dump_stack lib/dump_stack.c:94 [inline]) [<80201ac4>] (show_stack) from [<8021ee20>] (dump_stack_lvl+0x5c/0x70 lib/dump_stack.c:120) [<8021edc4>] (dump_stack_lvl) from [<8021ee4c>] (dump_stack+0x18/0x1c lib/dump_stack.c:129) r7:00000000 r6:00000013 r5:00000000 r4:00000001 [<8021ee34>] (dump_stack) from [<81a992cc>] (nmi_cpu_backtrace+0x150/0x170 lib/nmi_backtrace.c:113) [<81a9917c>] (nmi_cpu_backtrace) from [<81a9941c>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8 lib/nmi_backtrace.c:62) r7:00000000 r6:8280c550 r5:8281addc r4:ffffffff [<81a992ec>] (nmi_trigger_cpumask_backtrace) from [<8022fee0>] (arch_trigger_cpumask_backtrace+0x18/0x1c arch/arm/kernel/smp.c:852) r9:8280c6d0 r8:82ac3824 r7:00066927 r6:82804d80 r5:00007ea8 r4:00000048 [<8022fec8>] (arch_trigger_cpumask_backtrace) from [<81aa0f0c>] (trigger_all_cpu_backtrace include/linux/nmi.h:161 [inline]) [<8022fec8>] (arch_trigger_cpumask_backtrace) from [<81aa0f0c>] (__sys_info lib/sys_info.c:157 [inline]) [<8022fec8>] (arch_trigger_cpumask_backtrace) from [<81aa0f0c>] (sys_info+0x68/0xa8 lib/sys_info.c:165) [<81aa0ea4>] (sys_info) from [<80381924>] (check_hung_uninterruptible_tasks kernel/hung_task.c:346 [inline]) [<81aa0ea4>] (sys_info) from [<80381924>] (watchdog+0x44c/0x884 kernel/hung_task.c:515) r5:00007ea8 r4:859d2624 [<803814d8>] (watchdog) from [<8027f254>] (kthread+0x118/0x138 kernel/kthread.c:467) r10:00000000 r9:00000000 r8:803814d8 r7:df819e60 r6:8321c800 r5:830d9b80 r4:833d0600 [<8027f13c>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf8d5fb0 to 0xdf8d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f13c r4:833d0600 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 24808 Comm: dhcpcd-run-hook Tainted: G L syzkaller #0 PREEMPT Tainted: [L]=SOFTLOCKUP Hardware name: ARM-Versatile Express PC is at uaccess_save_and_enable arch/arm/include/asm/uaccess.h:59 [inline] PC is at do_strnlen_user lib/strnlen_user.c:52 [inline] PC is at strnlen_user+0xd4/0x144 lib/strnlen_user.c:122 LR is at do_strnlen_user lib/strnlen_user.c:52 [inline] LR is at strnlen_user+0xdc/0x144 lib/strnlen_user.c:122 pc : [<809a5124>] lr : [<809a512c>] psr: 80070013 sp : eab09ec0 ip : 00000004 fp : eab09ef4 r10: 80808080 r9 : fefefeff r8 : b5403587 r7 : b5003500 r6 : 00000008 r5 : 00020000 r4 : 00020000 r3 : 7ebfee94 r2 : 00000000 r1 : 7effffff r0 : 7ebfee9c Flags: Nzcv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none Control: 30c5387d Table: 85fe7240 DAC: 00000000 Call trace: [<809a5050>] (strnlen_user) from [<80573164>] (copy_strings+0x70/0x3b0 fs/exec.c:466) r10:7efffee5 r9:00000009 r8:7efff000 r7:00000000 r6:dedf5d8c r5:000000cf r4:7ebfee95 [<805730f4>] (copy_strings) from [<80573594>] (do_execveat_common+0xf0/0x18c fs/exec.c:1822) r10:0000000b r9:8674ec00 r8:00949f3c r7:00949f28 r6:8674ec00 r5:88920600 r4:00000010 [<805734a4>] (do_execveat_common) from [<805745d0>] (__do_sys_execve fs/exec.c:1930 [inline]) [<805734a4>] (do_execveat_common) from [<805745d0>] (sys_execve+0x40/0x5c fs/exec.c:1924) r9:8674ec00 r8:8020029c r7:0000000b r6:00949f3c r5:00949f28 r4:830d8000 [<80574590>] (sys_execve) from [<80200060>] (ret_fast_syscall+0x0/0x1c arch/arm/mm/proc-v7.S:67) Exception stack(0xeab09fa8 to 0xeab09ff0) 9fa0: 00949f84 00949f28 00949f84 00949f28 00949f3c 00000008 9fc0: 00949f84 00949f28 00949f3c 0000000b 76fd2548 00000002 76fd2614 76fd2548 9fe0: 76fd1c98 7ebfae3c 76f445a8 76e3d44c r6:00949f3c r5:00949f28 r4:00949f84