INFO: task kworker/0:18:10339 blocked for more than 431 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:18 state:D stack:0 pid:10339 tgid:10339 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63414>] (__schedule) from [<81a643a8>] (__schedule_loop kernel/sched/core.c:7011 [inline]) [<81a63414>] (__schedule) from [<81a643a8>] (schedule+0x2c/0x130 kernel/sched/core.c:7026) r10:ea461d84 r9:00000002 r8:60000013 r7:829171a0 r6:ea461d8c r5:84e53c00 r4:84e53c00 [<81a6437c>] (schedule) from [<81a64790>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7083) r5:84e53c00 r4:8291719c [<81a64778>] (schedule_preempt_disabled) from [<81a67340>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a64778>] (schedule_preempt_disabled) from [<81a67340>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a66ff0>] (__mutex_lock.constprop.0) from [<81a67ae8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea461e08 r4:00000000 [<81a67ad4>] (__mutex_lock_slowpath) from [<81a67b28>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a67aec>] (mutex_lock) from [<804ea014>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2918) [<804e9fac>] (_vm_unmap_aliases) from [<804eddf4>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9fac>] (_vm_unmap_aliases) from [<804eddf4>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f250c0 r4:00000000 [<804edc88>] (vfree) from [<80558b40>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:84e53c00 r7:00000000 r6:83018400 r5:00001000 r4:7f009000 [<80558b10>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:ea4fb000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:863bf38c r4:85922400 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:863bf38c r4:85922400 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:84e53c00 r8:8592242c r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:85922400 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85922400 r8:80278fec r7:eb9c1e60 r6:85922980 r5:84e53c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea461fb0 to 0xea461ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:84f7c840 INFO: task kworker/0:18:10339 is blocked on a mutex likely owned by task kworker/0:23:10349. task:kworker/0:23 state:R running task stack:0 pid:10349 tgid:10349 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a63414>] (__schedule) from [<81a647dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7256) r10:8280c9b4 r9:86bee000 r8:80200c04 r7:eb94dd54 r6:ffffffff r5:86bee000 r4:00000000 [<81a6479c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xeb94dd20 to 0xeb94dd68) dd20: e0b18000 eb9cb000 00000001 80239bf8 7f003000 00000001 82acb1c4 82aca5a0 dd40: 7f003000 eb9cb000 8280c9b4 eb94dd9c eb94dda0 eb94dd70 80230af0 80239c10 dd60: 80000113 ffffffff r5:80000113 r4:80239c10 [<80230a8c>] (flush_tlb_kernel_range) from [<804e9dd8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2342) r4:82acb1e4 [<804e9b54>] (__purge_vmap_area_lazy) from [<804ea190>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2957) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb94ddc0 r5:eb94de08 r4:eb94ddc0 [<804e9fac>] (_vm_unmap_aliases) from [<804eddf4>] (vm_reset_perms mm/vmalloc.c:3349 [inline]) [<804e9fac>] (_vm_unmap_aliases) from [<804eddf4>] (vfree+0x16c/0x210 mm/vmalloc.c:3428) r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85cc1500 r4:00000000 [<804edc88>] (vfree) from [<80558b40>] (execmem_free+0x30/0x50 mm/execmem.c:503) r9:83018405 r8:86bee000 r7:00000000 r6:83018400 r5:00001000 r4:7f007000 [<80558b10>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1052) r5:00001000 r4:e014f000 [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_binary_free kernel/bpf/core.c:1098 [inline]) [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1221) [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2898) r5:8639738c r4:8599dd00 [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3263) r7:dddcfd80 r6:83018400 r5:8639738c r4:8599dd00 [<802783ec>] (process_one_work) from [<802791e8>] (process_scheduled_works kernel/workqueue.c:3346 [inline]) [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3427) r10:61c88647 r9:86bee000 r8:8599dd2c r7:82804d40 r6:dddcfd80 r5:dddcfda0 r4:8599dd00 [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8599dd00 r8:80278fec r7:ea575e60 r6:8581ce00 r5:86bee000 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb94dfb0 to 0xeb94dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:847f48c0 NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 30 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT Hardware name: ARM-Versatile Express Call trace: [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c arch/arm/kernel/traps.c:257) r7:00000000 r6:000f0013 r5:600f0093 r4:82252424 [<80201b08>] (show_stack) from [<8021f8b0>] (__dump_stack lib/dump_stack.c:94 [inline]) [<80201b08>] (show_stack) from [<8021f8b0>] (dump_stack_lvl+0x70/0x7c lib/dump_stack.c:120) [<8021f840>] (dump_stack_lvl) from [<8021f8d4>] (dump_stack+0x18/0x1c lib/dump_stack.c:129) r5:00000001 r4:00000001 [<8021f8bc>] (dump_stack) from [<81a4d02c>] (nmi_cpu_backtrace+0x160/0x17c lib/nmi_backtrace.c:113) [<81a4cecc>] (nmi_cpu_backtrace) from [<81a4d178>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8 lib/nmi_backtrace.c:62) r7:00000001 r6:8280c690 r5:8281ae34 r4:ffffffff [<81a4d048>] (nmi_trigger_cpumask_backtrace) from [<802304fc>] (arch_trigger_cpumask_backtrace+0x18/0x1c arch/arm/kernel/smp.c:852) r9:8281ba28 r8:8280c810 r7:0002c6b2 r6:00007f26 r5:82abf7d4 r4:86ca540c [<802304e4>] (arch_trigger_cpumask_backtrace) from [<8037fb08>] (trigger_all_cpu_backtrace include/linux/nmi.h:160 [inline]) [<802304e4>] (arch_trigger_cpumask_backtrace) from [<8037fb08>] (check_hung_uninterruptible_tasks kernel/hung_task.c:332 [inline]) [<802304e4>] (arch_trigger_cpumask_backtrace) from [<8037fb08>] (watchdog+0x5d0/0x850 kernel/hung_task.c:495) [<8037f538>] (watchdog) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:00000000 r8:8037f538 r7:832a1a80 r6:832a1a80 r5:832e8c00 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf8d9fb0 to 0xdf8d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:8333d5c0 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 2820 Comm: pr/ttyAMA-1 Not tainted syzkaller #0 PREEMPT Hardware name: ARM-Versatile Express PC is at arch_static_branch arch/arm/include/asm/jump_label.h:22 [inline] PC is at slab_want_init_on_free mm/slab.h:642 [inline] PC is at maybe_wipe_obj_freeptr mm/slub.c:4914 [inline] PC is at slab_alloc_node mm/slub.c:5274 [inline] PC is at __kmalloc_cache_noprof+0x11c/0x44c mm/slub.c:5762 LR is at 0xa0000113 pc : [<8050fb34>] lr : [] psr: 60000113 sp : df801828 ip : 866c2880 fp : df80187c r10: df801828 r9 : 8431c800 r8 : 00000014 r7 : 866c2840 r6 : 00002920 r5 : 00000000 r4 : 83001240 r3 : 00000020 r2 : 018a3e10 r1 : 5b70d000 r0 : dddd3550 Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user Control: 30c5387d Table: 84dd5100 DAC: fffffffd Call trace: frame pointer underflow [<8050fa18>] (__kmalloc_cache_noprof) from [<8098f304>] (kmalloc_noprof include/linux/slab.h:957 [inline]) [<8050fa18>] (__kmalloc_cache_noprof) from [<8098f304>] (kzalloc_noprof include/linux/slab.h:1094 [inline]) [<8050fa18>] (__kmalloc_cache_noprof) from [<8098f304>] (ref_tracker_alloc+0x8c/0x234 lib/ref_tracker.c:271) r10:80000000 r9:85ea8600 r8:00000002 r7:866c3144 r6:00000820 r5:86c38800 r4:86c38b50 [<8098f278>] (ref_tracker_alloc) from [<81599864>] (__netdev_tracker_alloc include/linux/netdevice.h:4375 [inline]) [<8098f278>] (ref_tracker_alloc) from [<81599864>] (netdev_hold include/linux/netdevice.h:4404 [inline]) [<8098f278>] (ref_tracker_alloc) from [<81599864>] (dst_init+0x70/0x120 net/core/dst.c:52) r8:00000002 r7:ffffffff r6:829ec340 r5:86c38800 r4:866c3100 [<815997f4>] (dst_init) from [<81599970>] (dst_alloc+0x5c/0x88 net/core/dst.c:93) r8:ffffffff r7:86c38800 r6:00000002 r5:866c3100 r4:829ec340 [<81599914>] (dst_alloc) from [<8173aa94>] (rt_dst_alloc+0x2c/0x84 net/ipv4/route.c:1646) r8:00000029 r7:df8019d4 r6:00000002 r5:80000000 r4:86c38800 [<8173aa68>] (rt_dst_alloc) from [<81740058>] (__mkroute_output net/ipv4/route.c:2650 [inline]) [<8173aa68>] (rt_dst_alloc) from [<81740058>] (ip_route_output_key_hash_rcu+0x1a0/0x8b0 net/ipv4/route.c:2870) r7:df8019d4 r6:86c38800 r5:00000000 r4:df801a38 [<8173feb8>] (ip_route_output_key_hash_rcu) from [<81741280>] (ip_route_output_key_hash net/ipv4/route.c:2700 [inline]) [<8173feb8>] (ip_route_output_key_hash_rcu) from [<81741280>] (__ip_route_output_key include/net/route.h:169 [inline]) [<8173feb8>] (ip_route_output_key_hash_rcu) from [<81741280>] (ip_route_output_flow+0x5c/0xd0 net/ipv4/route.c:2927) r10:211414ac r9:00000001 r8:86d94100 r7:00000000 r6:86bfad00 r5:00000000 r4:df801a38 [<81741224>] (ip_route_output_flow) from [<817e3050>] (ip_route_output_key include/net/route.h:179 [inline]) [<81741224>] (ip_route_output_flow) from [<817e3050>] (ip_route_me_harder+0x17c/0x368 net/ipv4/netfilter.c:53) r7:86bfad00 r6:00000000 r5:00000000 r4:858d4480 [<817e2ed4>] (ip_route_me_harder) from [<816e52bc>] (synproxy_send_tcp+0xc0/0x190 net/netfilter/nf_synproxy_core.c:431) r10:86d94114 r9:86d95e40 r8:866c3081 r7:866c3080 r6:86bfad00 r5:86b21900 r4:858d4480 [<816e51fc>] (synproxy_send_tcp) from [<816e5704>] (synproxy_send_client_synack+0x190/0x1e8 net/netfilter/nf_synproxy_core.c:484) r9:86d95e40 r8:86d95e54 r7:df801b80 r6:858d43c0 r5:00000014 r4:858d4480 [<816e5574>] (synproxy_send_client_synack) from [<81720d58>] (nft_synproxy_eval_v4 net/netfilter/nft_synproxy.c:59 [inline]) [<816e5574>] (synproxy_send_client_synack) from [<81720d58>] (nft_synproxy_do_eval+0x25c/0x2b4 net/netfilter/nft_synproxy.c:141) r10:81e63348 r9:86d95e54 r8:86c17380 r7:86932f58 r6:df801c4c r5:86bfad00 r4:858d43c0 [<81720afc>] (nft_synproxy_do_eval) from [<81720ddc>] (nft_synproxy_eval+0x14/0x18 net/netfilter/nft_synproxy.c:247) r9:df801ce4 r8:81e634d0 r7:81e63234 r6:81e631f0 r5:86932f60 r4:86932f50 [<81720dc8>] (nft_synproxy_eval) from [<816e83ac>] (expr_call_ops_eval net/netfilter/nf_tables_core.c:237 [inline]) [<81720dc8>] (nft_synproxy_eval) from [<816e83ac>] (nft_do_chain+0x12c/0x570 net/netfilter/nf_tables_core.c:285) [<816e8280>] (nft_do_chain) from [<817022b0>] (nft_do_chain_inet+0xac/0x120 net/netfilter/nft_chain_filter.c:161) r10:dddd0ec8 r9:83b0ab20 r8:df801d3c r7:858d43c0 r6:83b0ab00 r5:00000004 r4:86ac8f40 [<81702204>] (nft_do_chain_inet) from [<816af9c0>] (nf_hook_entry_hookfn include/linux/netfilter.h:158 [inline]) [<81702204>] (nft_do_chain_inet) from [<816af9c0>] (nf_hook_slow+0x40/0x104 net/netfilter/core.c:623) r4:00000001 [<816af980>] (nf_hook_slow) from [<817439b4>] (nf_hook include/linux/netfilter.h:273 [inline]) [<816af980>] (nf_hook_slow) from [<817439b4>] (NF_HOOK include/linux/netfilter.h:316 [inline]) [<816af980>] (nf_hook_slow) from [<817439b4>] (ip_local_deliver+0xf0/0x110 net/ipv4/ip_input.c:260) r9:00000040 r8:00000021 r7:00000000 r6:86bfad00 r5:86c38800 r4:858d43c0 [<817438c4>] (ip_local_deliver) from [<81742a4c>] (dst_input include/net/dst.h:474 [inline]) [<817438c4>] (ip_local_deliver) from [<81742a4c>] (ip_rcv_finish+0x98/0xb0 net/ipv4/ip_input.c:453) r6:86c38800 r5:86bfad00 r4:858d43c0 [<817429b4>] (ip_rcv_finish) from [<81743aa8>] (NF_HOOK include/linux/netfilter.h:318 [inline]) [<817429b4>] (ip_rcv_finish) from [<81743aa8>] (NF_HOOK include/linux/netfilter.h:312 [inline]) [<817429b4>] (ip_rcv_finish) from [<81743aa8>] (ip_rcv+0xd4/0xe0 net/ipv4/ip_input.c:573) r7:00000000 r6:86bfad00 r5:858d43c0 r4:00000001 [<817439d4>] (ip_rcv) from [<8158f490>] (__netif_receive_skb_one_core+0x5c/0x80 net/core/dev.c:6079) r6:00000000 r5:817439d4 r4:86c38800 [<8158f434>] (__netif_receive_skb_one_core) from [<8158f4fc>] (__netif_receive_skb+0x18/0x5c net/core/dev.c:6192) r5:dddd0fb0 r4:858d43c0 [<8158f4e4>] (__netif_receive_skb) from [<8158f804>] (process_backlog+0xa0/0x17c net/core/dev.c:6544) r5:dddd0fb0 r4:858d43c0 [<8158f764>] (process_backlog) from [<81590064>] (__napi_poll+0x34/0x240 net/core/dev.c:7594) r10:00000000 r9:df801ea8 r8:00000000 r7:df801ea3 r6:00000040 r5:dddd0fb0 r4:00000001 [<81590030>] (__napi_poll) from [<815908bc>] (napi_poll net/core/dev.c:7657 [inline]) [<81590030>] (__napi_poll) from [<815908bc>] (net_rx_action+0x358/0x3ec net/core/dev.c:7784) r9:df801ea8 r8:00000000 r7:0000012c r6:5b70d000 r5:dddd0fb0 r4:ffffffff [<81590564>] (net_rx_action) from [<8025be24>] (handle_softirqs+0x140/0x458 kernel/softirq.c:622) r10:8431c800 r9:82804d40 r8:00000101 r7:00000003 r6:00000022 r5:00000002 r4:8280408c [<8025bce4>] (handle_softirqs) from [<8025c298>] (__do_softirq kernel/softirq.c:656 [inline]) [<8025bce4>] (handle_softirqs) from [<8025c298>] (invoke_softirq kernel/softirq.c:496 [inline]) [<8025bce4>] (handle_softirqs) from [<8025c298>] (__irq_exit_rcu+0x110/0x1d0 kernel/softirq.c:723) r10:82959554 r9:8431c800 r8:00000000 r7:eaf31e60 r6:824028d0 r5:8243dfd8 r4:8431c800 [<8025c188>] (__irq_exit_rcu) from [<8025c610>] (irq_exit+0x10/0x18 kernel/softirq.c:751) r5:8243dfd8 r4:826c299c [<8025c600>] (irq_exit) from [<81a5fc80>] (generic_handle_arch_irq+0x7c/0x80 kernel/irq/handle.c:287) [<81a5fc04>] (generic_handle_arch_irq) from [<81a300ec>] (call_with_stack+0x1c/0x20 arch/arm/lib/call_with_stack.S:40) r9:8431c800 r8:00000000 r7:eaf31e94 r6:ffffffff r5:60000113 r4:81a6d27c [<81a300d0>] (call_with_stack) from [<80200bec>] (__irq_svc+0x8c/0xbc arch/arm/kernel/entry-armv.S:228) Exception stack(0xeaf31e60 to 0xeaf31ea8) 1e60: 83d1ac40 60000113 00000000 00000f0d 00000001 00000000 829594b8 00000117 1e80: 00000000 00000000 82959554 eaf31ebc eaf31ec0 eaf31eb0 80a8ee08 81a6d27c 1ea0: 60000113 ffffffff [<81a6d254>] (_raw_spin_unlock_irqrestore) from [<80a8ee08>] (spin_unlock_irqrestore include/linux/spinlock.h:406 [inline]) [<81a6d254>] (_raw_spin_unlock_irqrestore) from [<80a8ee08>] (__uart_port_unlock_irqrestore include/linux/serial_core.h:616 [inline]) [<81a6d254>] (_raw_spin_unlock_irqrestore) from [<80a8ee08>] (pl011_console_device_unlock+0x20/0x24 drivers/tty/serial/amba-pl011.c:2603) [<80a8ede8>] (pl011_console_device_unlock) from [<802e3768>] (nbcon_emit_one+0x88/0x100 kernel/printk/nbcon.c:1142) [<802e36e0>] (nbcon_emit_one) from [<802e3988>] (nbcon_kthread_func+0x1a8/0x2a4 kernel/printk/nbcon.c:1229) r6:8280c690 r5:8431c800 r4:829594b8 [<802e37e0>] (nbcon_kthread_func) from [<8028020c>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:829594b8 r8:802e37e0 r7:84cd8280 r6:84cd8280 r5:8431c800 r4:00000001 [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf31fb0 to 0xeaf31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 r4:84cbcb00