INFO: task kworker/0:2:7820 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:2 state:D stack:0 pid:7820 tgid:7820 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81aa9c1c>] (__schedule) from [<81aaaeac>] (__schedule_loop kernel/sched/core.c:6949 [inline]) [<81aa9c1c>] (__schedule) from [<81aaaeac>] (schedule+0x2c/0x134 kernel/sched/core.c:6964) r10:ea7b5d84 r9:00000000 r8:60000113 r7:ea7b5d8c r6:829172e8 r5:856d5400 r4:856d5400 [<81aaae80>] (schedule) from [<81aab038>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7021) r5:856d5400 r4:829172e4 [<81aab020>] (schedule_preempt_disabled) from [<81aae600>] (__mutex_lock_common kernel/locking/mutex.c:692 [inline]) [<81aab020>] (schedule_preempt_disabled) from [<81aae600>] (__mutex_lock.constprop.0+0x584/0xf10 kernel/locking/mutex.c:776) [<81aae07c>] (__mutex_lock.constprop.0) from [<81aaf060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1065) r10:8280c7e4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea7b5e08 r4:00000000 [<81aaf04c>] (__mutex_lock_slowpath) from [<81aaf0a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:290) [<81aaf064>] (mutex_lock) from [<804f0fe0>] (_vm_unmap_aliases+0x5c/0x238 mm/vmalloc.c:2944) [<804f0f84>] (_vm_unmap_aliases) from [<804f4cc4>] (vm_reset_perms mm/vmalloc.c:3375 [inline]) [<804f0f84>] (_vm_unmap_aliases) from [<804f4cc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3454) r10:83018405 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ce94c0 r4:00000000 [<804f4b58>] (vfree) from [<805607f4>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83016170 r8:856d5400 r7:00000000 r6:83018400 r5:00001000 r4:7f2aa000 [<805607c4>] (execmem_free) from [<803ca91c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1068) r5:00001000 r4:eaca3000 [<803ca90c>] (bpf_jit_free_exec) from [<803cacfc>] (bpf_jit_binary_free kernel/bpf/core.c:1114 [inline]) [<803ca90c>] (bpf_jit_free_exec) from [<803cacfc>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1237) [<803cac98>] (bpf_jit_free) from [<803cbc1c>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2935) r5:8612d394 r4:84c50f80 [<803cbadc>] (bpf_prog_free_deferred) from [<80276cec>] (process_one_work+0x1b8/0x4f8 kernel/workqueue.c:3257) r7:dddcfb40 r6:83018400 r5:8612d394 r4:84c50f80 [<80276b34>] (process_one_work) from [<8027796c>] (process_scheduled_works kernel/workqueue.c:3340 [inline]) [<80276b34>] (process_one_work) from [<8027796c>] (worker_thread+0x1c4/0x394 kernel/workqueue.c:3421) r10:61c88647 r9:856d5400 r8:82804d80 r7:84c50fac r6:dddcfb40 r5:dddcfb60 r4:84c50f80 [<802777a8>] (worker_thread) from [<8027facc>] (kthread+0x128/0x27c kernel/kthread.c:463) r10:00000000 r9:84c50f80 r8:802777a8 r7:df841e68 r6:84ce5700 r5:856d5400 r4:00000001 [<8027f9a4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea7b5fb0 to 0xea7b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f9a4 r4:84d40f80 INFO: task kworker/0:2:7820 is blocked on a mutex likely owned by task kworker/0:5:3698. task:kworker/0:5 state:R running task stack:0 pid:3698 tgid:3698 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81aa9c1c>] (__schedule) from [<81aab2e4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7194) r10:8280c838 r9:83e1e000 r8:80200c04 r7:e0175d5c r6:ffffffff r5:83e1e000 r4:00000000 [<81aab2a4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xe0175d28 to 0xe0175d70) 5d20: ac9de000 eab3b000 00000001 802394d0 82ace620 82acf264 5d40: 7f298000 eab3b000 00000000 00000001 8280c838 e0175d9c eab3b000 e0175d78 5d60: 8023043c 802394e8 800f0113 ffffffff r5:800f0113 r4:802394e8 [<802303dc>] (flush_tlb_kernel_range) from [<804f0d94>] (__purge_vmap_area_lazy+0x260/0x450 mm/vmalloc.c:2369) [<804f0b34>] (__purge_vmap_area_lazy) from [<804f116c>] (_vm_unmap_aliases+0x1e8/0x238 mm/vmalloc.c:2983) r10:00000000 r9:e0175dc0 r8:00000000 r7:ffffffff r6:00000008 r5:e0175e08 r4:e0175dc0 [<804f0f84>] (_vm_unmap_aliases) from [<804f4cc4>] (vm_reset_perms mm/vmalloc.c:3375 [inline]) [<804f0f84>] (_vm_unmap_aliases) from [<804f4cc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3454) r10:83018405 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ce9480 r4:00000000 [<804f4b58>] (vfree) from [<805607f4>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83016170 r8:83e1e000 r7:00000000 r6:83018400 r5:00001000 r4:7f2bc000 [<805607c4>] (execmem_free) from [<803ca91c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1068) r5:00001000 r4:eaca5000 [<803ca90c>] (bpf_jit_free_exec) from [<803cacfc>] (bpf_jit_binary_free kernel/bpf/core.c:1114 [inline]) [<803ca90c>] (bpf_jit_free_exec) from [<803cacfc>] (bpf_jit_free+0x64/0xe0 kernel/bpf/core.c:1237) [<803cac98>] (bpf_jit_free) from [<803cbc1c>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2935) r5:85774794 r4:85ccd580 [<803cbadc>] (bpf_prog_free_deferred) from [<80276cec>] (process_one_work+0x1b8/0x4f8 kernel/workqueue.c:3257) r7:dddcfb40 r6:83018400 r5:85774794 r4:85ccd580 [<80276b34>] (process_one_work) from [<8027796c>] (process_scheduled_works kernel/workqueue.c:3340 [inline]) [<80276b34>] (process_one_work) from [<8027796c>] (worker_thread+0x1c4/0x394 kernel/workqueue.c:3421) r10:61c88647 r9:83e1e000 r8:82804d80 r7:85ccd5ac r6:dddcfb40 r5:dddcfb60 r4:85ccd580 [<802777a8>] (worker_thread) from [<8027facc>] (kthread+0x128/0x27c kernel/kthread.c:463) r10:00000000 r9:85ccd580 r8:802777a8 r7:df9d5e68 r6:85ccd600 r5:83e1e000 r4:00000001 [<8027f9a4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0175fb0 to 0xe0175ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f9a4 r4:85cd2040 NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 30 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT Hardware name: ARM-Versatile Express Call trace: [<80201a40>] (dump_backtrace) from [<80201b34>] (show_stack+0x18/0x1c arch/arm/kernel/traps.c:257) r7:600f0093 r6:600f0093 r5:822a269c r4:00000000 [<80201b1c>] (show_stack) from [<8021ed9c>] (__dump_stack lib/dump_stack.c:94 [inline]) [<80201b1c>] (show_stack) from [<8021ed9c>] (dump_stack_lvl+0x5c/0x70 lib/dump_stack.c:120) [<8021ed40>] (dump_stack_lvl) from [<8021edc8>] (dump_stack+0x18/0x1c lib/dump_stack.c:129) r7:00000000 r6:000f0013 r5:00000001 r4:00000001 [<8021edb0>] (dump_stack) from [<81a9385c>] (nmi_cpu_backtrace+0x150/0x170 lib/nmi_backtrace.c:113) [<81a9370c>] (nmi_cpu_backtrace) from [<81a939ac>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8 lib/nmi_backtrace.c:62) r7:00000001 r6:8280c510 r5:8281ad9c r4:ffffffff [<81a9387c>] (nmi_trigger_cpumask_backtrace) from [<8022fe60>] (arch_trigger_cpumask_backtrace+0x18/0x1c arch/arm/kernel/smp.c:852) r9:82ac382c r8:8280c690 r7:82804d80 r6:856d5bf0 r5:00007ea9 r4:00000048 [<8022fe48>] (arch_trigger_cpumask_backtrace) from [<81a9b490>] (trigger_all_cpu_backtrace include/linux/nmi.h:161 [inline]) [<8022fe48>] (arch_trigger_cpumask_backtrace) from [<81a9b490>] (__sys_info lib/sys_info.c:157 [inline]) [<8022fe48>] (arch_trigger_cpumask_backtrace) from [<81a9b490>] (sys_info+0x68/0xa8 lib/sys_info.c:165) [<81a9b428>] (sys_info) from [<80382f6c>] (check_hung_uninterruptible_tasks kernel/hung_task.c:346 [inline]) [<81a9b428>] (sys_info) from [<80382f6c>] (watchdog+0x458/0x888 kernel/hung_task.c:515) r5:00007ea9 r4:8539ff0c [<80382b14>] (watchdog) from [<8027facc>] (kthread+0x128/0x27c kernel/kthread.c:463) r10:00000000 r9:00000000 r8:80382b14 r7:832a2d00 r6:832a2d00 r5:832e9800 r4:00000001 [<8027f9a4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf8d9fb0 to 0xdf8d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f9a4 r4:8332f000 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 2813 Comm: pr/ttyAMA-1 Not tainted syzkaller #0 PREEMPT Hardware name: ARM-Versatile Express PC is at __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:152 [inline] PC is at _raw_spin_unlock_irqrestore+0x28/0x54 kernel/locking/spinlock.c:194 LR is at spin_unlock_irqrestore include/linux/spinlock.h:406 [inline] LR is at __uart_port_unlock_irqrestore include/linux/serial_core.h:616 [inline] LR is at pl011_console_device_unlock+0x20/0x24 drivers/tty/serial/amba-pl011.c:2603 pc : [<81ab4af0>] lr : [<80aa4664>] psr: 60070113 sp : eaf35eb0 ip : eaf35ec0 fp : eaf35ebc r10: 8295971c r9 : 00000000 r8 : 00000000 r7 : 00000117 r6 : 82959680 r5 : 00000000 r4 : 00000001 r3 : 00000d44 r2 : 00000000 r1 : 60070113 r0 : 8461c840 Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user Control: 30c5387d Table: 84b89700 DAC: fffffffd Call trace: [<81ab4ac8>] (_raw_spin_unlock_irqrestore) from [<80aa4664>] (spin_unlock_irqrestore include/linux/spinlock.h:406 [inline]) [<81ab4ac8>] (_raw_spin_unlock_irqrestore) from [<80aa4664>] (__uart_port_unlock_irqrestore include/linux/serial_core.h:616 [inline]) [<81ab4ac8>] (_raw_spin_unlock_irqrestore) from [<80aa4664>] (pl011_console_device_unlock+0x20/0x24 drivers/tty/serial/amba-pl011.c:2603) [<80aa4644>] (pl011_console_device_unlock) from [<802e50b0>] (nbcon_emit_one+0x88/0x100 kernel/printk/nbcon.c:1149) [<802e5028>] (nbcon_emit_one) from [<802e5330>] (nbcon_kthread_func+0x208/0x2ec kernel/printk/nbcon.c:1255) r6:82ac0104 r5:82959680 r4:84f68c00 [<802e5128>] (nbcon_kthread_func) from [<8027facc>] (kthread+0x128/0x27c kernel/kthread.c:463) r10:00000000 r9:82959680 r8:802e5128 r7:84e30280 r6:84e30280 r5:84f68c00 r4:00000001 [<8027f9a4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf35fb0 to 0xeaf35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f9a4 r4:844b0500