INFO: task kworker/u10:0:27 blocked for more than 430 seconds. Not tainted 6.16.0-rc1-syzkaller-g306e57988197 #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/u10:0 state:D stack:0 pid:27 tgid:27 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events_unbound bpf_map_free_deferred Call Trace: [] context_switch kernel/sched/core.c:5396 [inline] [] __schedule+0x1022/0x4094 kernel/sched/core.c:6785 [] __schedule_loop kernel/sched/core.c:6863 [inline] [] schedule+0xc4/0x35e kernel/sched/core.c:6878 [] schedule_timeout+0x1c6/0x2ae kernel/time/sleep_timeout.c:75 [] do_wait_for_common kernel/sched/completion.c:95 [inline] [] __wait_for_common+0x1d2/0x3e8 kernel/sched/completion.c:116 [] wait_for_common kernel/sched/completion.c:127 [inline] [] wait_for_completion+0x1a/0x22 kernel/sched/completion.c:148 [] rcu_barrier+0x2dc/0x6cc kernel/rcu/tree.c:3850 [] dev_map_free+0x11c/0x6bc kernel/bpf/devmap.c:214 [] bpf_map_free kernel/bpf/syscall.c:862 [inline] [] bpf_map_free_deferred+0x226/0x47a kernel/bpf/syscall.c:888 [] process_one_work+0x96a/0x1f32 kernel/workqueue.c:3238 [] process_scheduled_works kernel/workqueue.c:3321 [inline] [] worker_thread+0x5ce/0xde8 kernel/workqueue.c:3402 [] kthread+0x39c/0x7d4 kernel/kthread.c:464 [] ret_from_fork_kernel+0x2a/0xbb2 arch/riscv/kernel/process.c:214 [] ret_from_fork_kernel_asm+0x16/0x18 arch/riscv/kernel/entry.S:327 Showing all locks held in the system: 3 locks held by kworker/u10:0/27: #0: ffffaf8011a89148 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_one_work+0x848/0x1f32 kernel/workqueue.c:3213 #1: ffff8f80001d7b70 ((work_completion)(&map->work)){+.+.}-{0:0}, at: process_one_work+0x870/0x1f32 kernel/workqueue.c:3213 #2: ffffffff883ec5c0 (rcu_state.barrier_mutex){+.+.}-{4:4}, at: rcu_barrier+0x56/0x6cc kernel/rcu/tree.c:3782 1 lock held by khungtaskd/37: #0: ffffffff883dc3a0 (rcu_read_lock){....}-{1:3}, at: debug_show_all_locks+0x2a/0x1a0 kernel/locking/lockdep.c:6766 3 locks held by kworker/u10:3/53: 6 locks held by kworker/0:2/822: 1 lock held by klogd/2987: 2 locks held by getty/3151: #0: ffffaf80185b60a0 (&tty->ldisc_sem){++++}-{0:0}, at: ldsem_down_read+0x3a/0x46 drivers/tty/tty_ldsem.c:340 #1: ffff8f800008b2f0 (&ldata->atomic_read_lock){+.+.}-{4:4}, at: n_tty_read+0x3e4/0x12b6 drivers/tty/n_tty.c:2222 2 locks held by syz-executor/3187: 2 locks held by kworker/0:1/3190: 3 locks held by syz-executor/3200: 3 locks held by syz-executor/3201: 2 locks held by kworker/0:3/3814: 3 locks held by kworker/1:3/3898: 4 locks held by kworker/0:4/3899: 2 locks held by kworker/0:5/3900: 2 locks held by kworker/0:0/4434: 2 locks held by kworker/0:6/4622: 2 locks held by kworker/0:8/4658: 2 locks held by kworker/0:10/4668: 2 locks held by kworker/0:13/4702: 2 locks held by kworker/0:14/4705: 2 locks held by kworker/0:15/4720: 2 locks held by kworker/0:16/4728: 2 locks held by kworker/0:17/4789: 2 locks held by kworker/0:18/4807: 2 locks held by syz-executor/4843: ============================================= NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 37 Comm: khungtaskd Not tainted 6.16.0-rc1-syzkaller-g306e57988197 #0 PREEMPT Hardware name: riscv-virtio,qemu (DT) Call Trace: [] dump_backtrace+0x2e/0x3c arch/riscv/kernel/stacktrace.c:132 [] show_stack+0x30/0x3c arch/riscv/kernel/stacktrace.c:138 [] __dump_stack lib/dump_stack.c:94 [inline] [] dump_stack_lvl+0x12e/0x1a6 lib/dump_stack.c:120 [] dump_stack+0x1c/0x24 lib/dump_stack.c:129 [] nmi_cpu_backtrace+0x3b0/0x3b2 lib/nmi_backtrace.c:113 [] nmi_trigger_cpumask_backtrace+0x2b6/0x458 lib/nmi_backtrace.c:62 [] arch_trigger_cpumask_backtrace+0x2c/0x3c arch/riscv/kernel/smp.c:350 [] trigger_all_cpu_backtrace include/linux/nmi.h:158 [inline] [] check_hung_uninterruptible_tasks kernel/hung_task.c:307 [inline] [] watchdog+0xcea/0x1618 kernel/hung_task.c:470 [] kthread+0x39c/0x7d4 kernel/kthread.c:464 [] ret_from_fork_kernel+0x2a/0xbb2 arch/riscv/kernel/process.c:214 [] ret_from_fork_kernel_asm+0x16/0x18 arch/riscv/kernel/entry.S:327 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 15 Comm: ksoftirqd/0 Not tainted 6.16.0-rc1-syzkaller-g306e57988197 #0 PREEMPT Hardware name: riscv-virtio,qemu (DT) epc : __sanitizer_cov_trace_const_cmp2+0x0/0x1c kernel/kcov.c:306 ra : xfrm_lookup_with_ifid+0x35a/0x20b2 net/xfrm/xfrm_policy.c:3233 epc : ffffffff804e7ea4 ra : ffffffff85a2865a sp : ffff8f8000106910 gp : ffffffff89c4eee0 tp : ffffaf8012ae3480 t0 : ffff8f8000106bc8 t1 : fffffffff2f20000 t2 : fffffffff2f20000 s0 : ffff8f8000106ac0 s1 : ffff8f8000106a40 a0 : 0000000000000000 a1 : 0000000000000002 a2 : 0000000000f00000 a3 : ffffffff85a28624 a4 : 1ffff5f00669ee27 a5 : 0000000000000000 a6 : 0000000000f00000 a7 : fffffffff1f1f1f1 s2 : ffffaf80334f7100 s3 : 0000000000000000 s4 : ffffaf8012371fc0 s5 : 0000000000000000 s6 : ffff8f8000106b90 s7 : 0000000000000002 s8 : ffff8f80001069e0 s9 : 0000000000000002 s10: 1ffff5f00669ee21 s11: 1ffff1f000020d2c t3 : ffffaf80334f7108 t4 : 0000000000001fff t5 : 00000000000000c8 t6 : ffff8f8000106a14 status: 0000000200000120 badaddr: 0000000000000000 cause: 8000000000000001 [] __sanitizer_cov_trace_const_cmp2+0x0/0x1c kernel/kcov.c:302 [] xfrm_lookup+0x34/0x46 net/xfrm/xfrm_policy.c:3336 [] ip_route_me_harder+0xce8/0x11a6 net/ipv4/netfilter.c:69 [] synproxy_send_tcp.isra.0+0x2be/0x5d2 net/netfilter/nf_synproxy_core.c:431 [] synproxy_send_client_synack+0x6dc/0x8be net/netfilter/nf_synproxy_core.c:484 [] nft_synproxy_eval_v4 net/netfilter/nft_synproxy.c:59 [inline] [] nft_synproxy_do_eval+0x8ac/0xa52 net/netfilter/nft_synproxy.c:141 [] nft_synproxy_eval+0x28/0x36 net/netfilter/nft_synproxy.c:247 [] expr_call_ops_eval net/netfilter/nf_tables_core.c:237 [inline] [] nft_do_chain+0x328/0x1598 net/netfilter/nf_tables_core.c:285 [] nft_do_chain_inet+0x180/0x316 net/netfilter/nft_chain_filter.c:161 [] nf_hook_entry_hookfn include/linux/netfilter.h:157 [inline] [] nf_hook_slow+0xb8/0x1ec net/netfilter/core.c:623 [] nf_hook include/linux/netfilter.h:272 [inline] [] NF_HOOK include/linux/netfilter.h:315 [inline] [] ip_local_deliver+0x2ea/0x568 net/ipv4/ip_input.c:254 [] dst_input include/net/dst.h:469 [inline] [] ip_rcv_finish+0x1b0/0x2d2 net/ipv4/ip_input.c:447 [] NF_HOOK include/linux/netfilter.h:317 [inline] [] NF_HOOK include/linux/netfilter.h:311 [inline] [] ip_rcv+0xd6/0x44e net/ipv4/ip_input.c:567 [] __netif_receive_skb_one_core+0x106/0x16e net/core/dev.c:5977 [] __netif_receive_skb+0x2c/0x144 net/core/dev.c:6090 [] process_backlog+0x4f6/0x1cb0 net/core/dev.c:6442 [] __napi_poll.constprop.0+0xaa/0x4ba net/core/dev.c:7414 [] napi_poll net/core/dev.c:7478 [inline] [] net_rx_action+0xad4/0xefc net/core/dev.c:7605 [] handle_softirqs+0x4b2/0x132e kernel/softirq.c:579 [] run_ksoftirqd kernel/softirq.c:968 [inline] [] run_ksoftirqd+0xce/0x144 kernel/softirq.c:960 [] smpboot_thread_fn+0x420/0xc80 kernel/smpboot.c:164 [] kthread+0x39c/0x7d4 kernel/kthread.c:464 [] ret_from_fork_kernel+0x2a/0xbb2 arch/riscv/kernel/process.c:214 [] ret_from_fork_kernel_asm+0x16/0x18 arch/riscv/kernel/entry.S:327