INFO: task kworker/0:24:11099 blocked for more than 430 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:24 state:D stack:0 pid:11099 tgid:11099 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3d27c>] (__schedule) from [<81a3e210>] (__schedule_loop kernel/sched/core.c:7043 [inline]) [<81a3d27c>] (__schedule) from [<81a3e210>] (schedule+0x2c/0x130 kernel/sched/core.c:7058) r10:dfc2dd84 r9:00000002 r8:60000113 r7:82916594 r6:dfc2dd8c r5:83862400 r4:83862400 [<81a3e1e4>] (schedule) from [<81a3e5f8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7115) r5:83862400 r4:82916590 [<81a3e5e0>] (schedule_preempt_disabled) from [<81a411a8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3e5e0>] (schedule_preempt_disabled) from [<81a411a8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a40e58>] (__mutex_lock.constprop.0) from [<81a41950>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc2de08 r4:00000000 [<81a4193c>] (__mutex_lock_slowpath) from [<81a41990>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a41954>] (mutex_lock) from [<804e04fc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e0494>] (_vm_unmap_aliases) from [<804e42dc>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e0494>] (_vm_unmap_aliases) from [<804e42dc>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857e2a00 r4:00000000 [<804e4170>] (vfree) from [<8054cf3c>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:83862400 r7:00000000 r6:83018000 r5:00001000 r4:7f2b2000 [<8054cf0c>] (execmem_free) from [<803c3350>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:df83f000 [<803c3340>] (bpf_jit_free_exec) from [<803c3730>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c3340>] (bpf_jit_free_exec) from [<803c3730>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c36c8>] (bpf_jit_free) from [<803c47d8>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2923) r5:8566138c r4:84e0d400 [<803c4698>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:8566138c r4:84e0d400 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83862400 r8:84e0d42c r7:82804d40 r6:dddced40 r5:dddced60 r4:84e0d400 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:84e0d400 r8:8027ade4 r7:e032de60 r6:84a20980 r5:83862400 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc2dfb0 to 0xdfc2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:85fb7600 INFO: task kworker/0:24:11099 is blocked on a mutex likely owned by task kworker/1:91:11216. task:kworker/1:91 state:R running task stack:0 pid:11216 tgid:11216 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3d27c>] (__schedule) from [<81a3e644>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7288) r10:8280c9b4 r9:847e8c00 r8:80200c04 r7:e03fdd54 r6:ffffffff r5:847e8c00 r4:00000000 [<81a3e604>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xe03fdd20 to 0xe03fdd68) dd20: 8af26000 e033b000 00000001 80239bb8 7f2b2000 00000001 82ac8f44 82ac8320 dd40: 7f2b2000 e033b000 8280c9b4 e03fdd9c e03fdda0 e03fdd70 80230af0 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e02c0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82ac8f64 [<804e003c>] (__purge_vmap_area_lazy) from [<804e0678>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e03fddc0 r5:e03fde08 r4:e03fddc0 [<804e0494>] (_vm_unmap_aliases) from [<804e42dc>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e0494>] (_vm_unmap_aliases) from [<804e42dc>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86bb84c0 r4:00000000 [<804e4170>] (vfree) from [<8054cf3c>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018205 r8:847e8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f2c0000 [<8054cf0c>] (execmem_free) from [<803c3350>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:df9dd000 [<803c3340>] (bpf_jit_free_exec) from [<803c3730>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c3340>] (bpf_jit_free_exec) from [<803c3730>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c36c8>] (bpf_jit_free) from [<803c47d8>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2923) r5:8566078c r4:849d9880 [<803c4698>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:ddde2d40 r6:83018200 r5:8566078c r4:849d9880 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:847e8c00 r8:849d98ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:849d9880 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:849d9880 r8:8027ade4 r7:e03a5e60 r6:84e80280 r5:847e8c00 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe03fdfb0 to 0xe03fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:858c2e00 NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 32 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT Hardware name: ARM-Versatile Express Call trace: [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c arch/arm/kernel/traps.c:257) r7:00000000 r6:00000013 r5:60000093 r4:82260afc [<80201b08>] (show_stack) from [<8021fc00>] (__dump_stack lib/dump_stack.c:94 [inline]) [<80201b08>] (show_stack) from [<8021fc00>] (dump_stack_lvl+0x70/0x7c lib/dump_stack.c:120) [<8021fb90>] (dump_stack_lvl) from [<8021fc24>] (dump_stack+0x18/0x1c lib/dump_stack.c:129) r5:00000000 r4:00000001 [<8021fc0c>] (dump_stack) from [<81a26e90>] (nmi_cpu_backtrace+0x160/0x17c lib/nmi_backtrace.c:113) [<81a26d30>] (nmi_cpu_backtrace) from [<81a26fdc>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8 lib/nmi_backtrace.c:62) r7:00000000 r6:8280c690 r5:8281ac94 r4:ffffffff [<81a26eac>] (nmi_trigger_cpumask_backtrace) from [<802304fc>] (arch_trigger_cpumask_backtrace+0x18/0x1c arch/arm/kernel/smp.c:852) r9:82abd564 r8:82804d40 r7:0002e64f r6:00007efa r5:8281b248 r4:85f9ac0c [<802304e4>] (arch_trigger_cpumask_backtrace) from [<8037d978>] (trigger_all_cpu_backtrace include/linux/nmi.h:160 [inline]) [<802304e4>] (arch_trigger_cpumask_backtrace) from [<8037d978>] (check_hung_uninterruptible_tasks kernel/hung_task.c:328 [inline]) [<802304e4>] (arch_trigger_cpumask_backtrace) from [<8037d978>] (watchdog+0x4d4/0x81c kernel/hung_task.c:491) [<8037d4a4>] (watchdog) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:00000000 r8:8037d4a4 r7:832a0300 r6:832a0300 r5:832e4800 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf8e1fb0 to 0xdf8e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:833887c0 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 6509 Comm: kworker/u10:2 Not tainted syzkaller #0 PREEMPT Hardware name: ARM-Versatile Express Workqueue: events_unbound nsim_dev_trap_report_work PC is at kmem_cache_alloc_node_noprof+0x0/0x338 mm/slub.c:4291 LR is at kmalloc_reserve+0x94/0xfc net/core/skbuff.c:578 pc : [<80503254>] lr : [<81550700>] psr: 60000113 sp : df805b08 ip : 00000140 fp : df805b34 r10: 00082820 r9 : 00000000 r8 : 828060c0 r7 : ffffffff r6 : df805b43 r5 : df805b3c r4 : 00000820 r3 : df805b43 r2 : ffffffff r1 : 00082820 r0 : 830a7cc0 Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none Control: 30c5387d Table: 8555d180 DAC: 00000000 Call trace: frame pointer underflow [<8155066c>] (kmalloc_reserve) from [<81551c30>] (__alloc_skb+0x94/0x160 net/core/skbuff.c:669) r10:00000100 r9:85ffab40 r8:00000820 r7:00000000 r6:830a7c00 r5:ffffffff r4:8610bd80 r3:df805b43 [<81551b9c>] (__alloc_skb) from [<816cfaa4>] (alloc_skb include/linux/skbuff.h:1336 [inline]) [<81551b9c>] (__alloc_skb) from [<816cfaa4>] (synproxy_send_client_synack_ipv6+0x7c/0x1e8 net/netfilter/nf_synproxy_core.c:873) r8:85ffac68 r7:df805bd0 r6:8610b300 r5:00000000 r4:8610b300 [<816cfa28>] (synproxy_send_client_synack_ipv6) from [<8170a160>] (nft_synproxy_eval_v6 net/netfilter/nft_synproxy.c:90 [inline]) [<816cfa28>] (synproxy_send_client_synack_ipv6) from [<8170a160>] (nft_synproxy_do_eval+0x29c/0x2b4 net/netfilter/nft_synproxy.c:145) r10:81e6fec8 r9:85ffac68 r8:8611c640 r7:847ca1d8 r6:df805c9c r5:848a9d80 r4:8610b300 [<81709ec4>] (nft_synproxy_do_eval) from [<8170a1a4>] (nft_synproxy_eval+0x14/0x18 net/netfilter/nft_synproxy.c:247) r9:df805d34 r8:81e70050 r7:81e6fdb4 r6:81e6fd70 r5:847ca1e0 r4:847ca1d0 [<8170a190>] (nft_synproxy_eval) from [<816d2a48>] (expr_call_ops_eval net/netfilter/nf_tables_core.c:237 [inline]) [<8170a190>] (nft_synproxy_eval) from [<816d2a48>] (nft_do_chain+0x12c/0x570 net/netfilter/nf_tables_core.c:285) [<816d291c>] (nft_do_chain) from [<816ec100>] (nft_do_chain_inet+0xac/0x120 net/netfilter/nft_chain_filter.c:161) r10:ddde3e88 r9:847ca9c0 r8:df805d8c r7:8610b300 r6:847ca9c0 r5:00000000 r4:84ee7040 [<816ec054>] (nft_do_chain_inet) from [<8169a114>] (nf_hook_entry_hookfn include/linux/netfilter.h:158 [inline]) [<816ec054>] (nft_do_chain_inet) from [<8169a114>] (nf_hook_slow+0x40/0x104 net/netfilter/core.c:623) r4:8610b300 [<8169a0d4>] (nf_hook_slow) from [<81827c44>] (nf_hook include/linux/netfilter.h:273 [inline]) [<8169a0d4>] (nf_hook_slow) from [<81827c44>] (NF_HOOK include/linux/netfilter.h:316 [inline]) [<8169a0d4>] (nf_hook_slow) from [<81827c44>] (ip6_input+0xb8/0xd8 net/ipv6/ip6_input.c:500) r9:00000040 r8:00000037 r7:00000000 r6:848a9d80 r5:84c20800 r4:8610b300 [<81827b8c>] (ip6_input) from [<81827098>] (dst_input include/net/dst.h:471 [inline]) [<81827b8c>] (ip6_input) from [<81827098>] (ip6_rcv_finish net/ipv6/ip6_input.c:79 [inline]) [<81827b8c>] (ip6_input) from [<81827098>] (NF_HOOK include/linux/netfilter.h:318 [inline]) [<81827b8c>] (ip6_input) from [<81827098>] (NF_HOOK include/linux/netfilter.h:312 [inline]) [<81827b8c>] (ip6_input) from [<81827098>] (ipv6_rcv+0x150/0x15c net/ipv6/ip6_input.c:311) r6:848a9d80 r5:8610b300 r4:00000001 [<81826f48>] (ipv6_rcv) from [<8157c9a8>] (__netif_receive_skb_one_core+0x5c/0x80 net/core/dev.c:5991) r6:00000000 r5:81826f48 r4:84c20800 [<8157c94c>] (__netif_receive_skb_one_core) from [<8157ca14>] (__netif_receive_skb+0x18/0x5c net/core/dev.c:6104) r5:ddde3f70 r4:8610b300 [<8157c9fc>] (__netif_receive_skb) from [<8157cd1c>] (process_backlog+0xa0/0x17c net/core/dev.c:6456) r5:ddde3f70 r4:8610b300 [<8157cc7c>] (process_backlog) from [<8157d578>] (__napi_poll+0x34/0x240 net/core/dev.c:7506) r10:ddde3e80 r9:00000000 r8:df805ed8 r7:df805ed3 r6:00000040 r5:ddde3f70 r4:00000001 [<8157d544>] (__napi_poll) from [<8157de64>] (napi_poll net/core/dev.c:7569 [inline]) [<8157d544>] (__napi_poll) from [<8157de64>] (net_rx_action+0x3a0/0x430 net/core/dev.c:7696) r9:00000000 r8:df805ed8 r7:0000012c r6:00000000 r5:5b721000 r4:ddde3f70 [<8157dac4>] (net_rx_action) from [<8025de30>] (handle_softirqs+0x140/0x458 kernel/softirq.c:579) r10:85c91800 r9:82804d40 r8:00000102 r7:00000003 r6:00000008 r5:00000004 r4:8280408c [<8025dcf0>] (handle_softirqs) from [<802012f0>] (__do_softirq+0x14/0x18 kernel/softirq.c:613) r10:85ad3500 r9:84edf500 r8:85ad3600 r7:00000060 r6:81d948b8 r5:00000002 r4:60000113 [<802012dc>] (__do_softirq) from [<8022858c>] (____do_softirq+0x10/0x14 arch/arm/kernel/irq.c:77) [<8022857c>] (____do_softirq) from [<81a08fc4>] (call_with_stack+0x1c/0x20 arch/arm/lib/call_with_stack.S:40) [<81a08fa8>] (call_with_stack) from [<802285c8>] (do_softirq_own_stack+0x38/0x3c arch/arm/kernel/irq.c:82) [<80228590>] (do_softirq_own_stack) from [<8025e438>] (do_softirq kernel/softirq.c:480 [inline]) [<80228590>] (do_softirq_own_stack) from [<8025e438>] (do_softirq+0x5c/0x64 kernel/softirq.c:467) [<8025e3dc>] (do_softirq) from [<8025e50c>] (__local_bh_enable_ip+0xcc/0xd0 kernel/softirq.c:407) r5:00000002 r4:85c91800 [<8025e440>] (__local_bh_enable_ip) from [<81a470f8>] (__raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline]) [<8025e440>] (__local_bh_enable_ip) from [<81a470f8>] (_raw_spin_unlock_bh+0x34/0x38 kernel/locking/spinlock.c:210) r5:84edf060 r4:8610b240 [<81a470c4>] (_raw_spin_unlock_bh) from [<80e493ac>] (spin_unlock_bh include/linux/spinlock.h:396 [inline]) [<81a470c4>] (_raw_spin_unlock_bh) from [<80e493ac>] (nsim_dev_trap_report drivers/net/netdevsim/dev.c:835 [inline]) [<81a470c4>] (_raw_spin_unlock_bh) from [<80e493ac>] (nsim_dev_trap_report_work+0x2e4/0x410 drivers/net/netdevsim/dev.c:866) [<80e490c8>] (nsim_dev_trap_report_work) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r10:8300e470 r9:8301ce05 r8:85c91800 r7:83262000 r6:8301ce00 r5:84edf500 r4:85647c80 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85c91800 r8:85647cac r7:82804d40 r6:83262000 r5:83262020 r4:85647c80 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85647c80 r8:8027ade4 r7:ea9c5e60 r6:84e8a680 r5:85c91800 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa7dfb0 to 0xdfa7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:84f57740