INFO: task kworker/1:5:3807 blocked for more than 430 seconds. Not tainted 6.11.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:5 state:D stack:0 pid:3807 tgid:3807 ppid:2 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<819a5824>] (__schedule) from [<819a63bc>] (__schedule_loop kernel/sched/core.c:6606 [inline]) [<819a5824>] (__schedule) from [<819a63bc>] (schedule+0x2c/0xfc kernel/sched/core.c:6621) r10:8260ca7c r9:00000000 r8:82714af8 r7:00000002 r6:dff41da4 r5:83dfec00 r4:83dfec00 [<819a6390>] (schedule) from [<819a6770>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6678) r5:83dfec00 r4:82714af4 [<819a6758>] (schedule_preempt_disabled) from [<819a9248>] (__mutex_lock_common kernel/locking/mutex.c:684 [inline]) [<819a6758>] (schedule_preempt_disabled) from [<819a9248>] (__mutex_lock.constprop.0+0x2e8/0xae0 kernel/locking/mutex.c:752) [<819a8f60>] (__mutex_lock.constprop.0) from [<819a9b14>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1040) r10:8260ca7c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff41e20 r4:00000000 [<819a9b00>] (__mutex_lock_slowpath) from [<819a9b54>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:286) [<819a9b18>] (mutex_lock) from [<804a8aa4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2849) [<804a8a3c>] (_vm_unmap_aliases) from [<804ac800>] (vm_reset_perms mm/vmalloc.c:3278 [inline]) [<804a8a3c>] (_vm_unmap_aliases) from [<804ac800>] (vfree+0x170/0x1e4 mm/vmalloc.c:3357) r10:82c16205 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85757800 r4:00000000 [<804ac690>] (vfree) from [<80504070>] (execmem_free+0x30/0x64 mm/execmem.c:69) r9:83dfec00 r8:01800000 r7:00000000 r6:82c16200 r5:00001000 r4:7f23c000 [<80504040>] (execmem_free) from [<80395e0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1072) r5:00001000 r4:eaead000 [<80395dfc>] (bpf_jit_free_exec) from [<803961ec>] (bpf_jit_binary_free kernel/bpf/core.c:1118 [inline]) [<80395dfc>] (bpf_jit_free_exec) from [<803961ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1241) [<80396184>] (bpf_jit_free) from [<80397328>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2800) r5:84da2f54 r4:84da2c00 [<803971dc>] (bpf_prog_free_deferred) from [<80265f98>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3231) r7:ddde3f40 r6:82c16200 r5:84da2f54 r4:8501f800 [<80265de4>] (process_one_work) from [<80266b7c>] (process_scheduled_works kernel/workqueue.c:3312 [inline]) [<80265de4>] (process_one_work) from [<80266b7c>] (worker_thread+0x1ec/0x3bc kernel/workqueue.c:3393) r10:83dfec00 r9:8501f82c r8:61c88647 r7:ddde3f60 r6:82604d40 r5:ddde3f40 r4:8501f800 [<80266990>] (worker_thread) from [<8026fb98>] (kthread+0x104/0x134 kernel/kthread.c:389) r10:00000000 r9:dfdc5e78 r8:850aba80 r7:8501f800 r6:80266990 r5:83dfec00 r4:850ad680 [<8026fa94>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff41fb0 to 0xdff41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fa94 r4:850ad680 NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 32 Comm: khungtaskd Not tainted 6.11.0-syzkaller #0 Hardware name: ARM-Versatile Express Call trace: [<819839d8>] (dump_backtrace) from [<81983ad4>] (show_stack+0x18/0x1c arch/arm/kernel/traps.c:257) r7:00000000 r6:00000013 r5:60000093 r4:82035550 [<81983abc>] (show_stack) from [<819a1a54>] (__dump_stack lib/dump_stack.c:93 [inline]) [<81983abc>] (show_stack) from [<819a1a54>] (dump_stack_lvl+0x70/0x7c lib/dump_stack.c:119) [<819a19e4>] (dump_stack_lvl) from [<819a1a78>] (dump_stack+0x18/0x1c lib/dump_stack.c:128) r5:00000000 r4:00000001 [<819a1a60>] (dump_stack) from [<81970cc8>] (nmi_cpu_backtrace+0x160/0x17c lib/nmi_backtrace.c:113) [<81970b68>] (nmi_cpu_backtrace) from [<81970e14>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8 lib/nmi_backtrace.c:62) r7:00000000 r6:8260c5d0 r5:8261a88c r4:ffffffff [<81970ce4>] (nmi_trigger_cpumask_backtrace) from [<802103e8>] (arch_trigger_cpumask_backtrace+0x18/0x1c arch/arm/kernel/smp.c:851) r9:00024740 r8:828b4d30 r7:8260c734 r6:00007f24 r5:8261ae48 r4:8448a01c [<802103d0>] (arch_trigger_cpumask_backtrace) from [<80353200>] (trigger_all_cpu_backtrace include/linux/nmi.h:162 [inline]) [<802103d0>] (arch_trigger_cpumask_backtrace) from [<80353200>] (check_hung_uninterruptible_tasks kernel/hung_task.c:223 [inline]) [<802103d0>] (arch_trigger_cpumask_backtrace) from [<80353200>] (watchdog+0x498/0x5b8 kernel/hung_task.c:379) [<80352d68>] (watchdog) from [<8026fb98>] (kthread+0x104/0x134 kernel/kthread.c:389) r10:00000000 r9:df819e58 r8:82e9e440 r7:00000000 r6:80352d68 r5:82ee1800 r4:82f46a00 [<8026fa94>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf8e1fb0 to 0xdf8e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fa94 r4:82f46a00 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 8677 Comm: kworker/1:2 Not tainted 6.11.0-syzkaller #0 Hardware name: ARM-Versatile Express Workqueue: events nsim_dev_trap_report_work PC is at __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:152 [inline] PC is at _raw_spin_unlock_irqrestore+0x28/0x54 kernel/locking/spinlock.c:194 LR is at __debug_check_no_obj_freed lib/debugobjects.c:998 [inline] LR is at debug_check_no_obj_freed+0x184/0x2a0 lib/debugobjects.c:1019 pc : [<819aebc8>] lr : [<808493c8>] psr: 60000113 sp : df805ab0 ip : df805ac0 fp : df805abc r10: 81c60bf4 r9 : 84fcbc00 r8 : 84fcbcc0 r7 : 8147da7c r6 : 00000100 r5 : 00000000 r4 : 00000000 r3 : 0000f59c r2 : 0000276a r1 : 20000113 r0 : 828eec44 Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none Control: 30c5387d Table: 843e0100 DAC: 00000000 Call trace: frame pointer underflow [<819aeba0>] (_raw_spin_unlock_irqrestore) from [<808493c8>] (__debug_check_no_obj_freed lib/debugobjects.c:998 [inline]) [<819aeba0>] (_raw_spin_unlock_irqrestore) from [<808493c8>] (debug_check_no_obj_freed+0x184/0x2a0 lib/debugobjects.c:1019) [<80849244>] (debug_check_no_obj_freed) from [<804c067c>] (slab_free_hook mm/slub.c:2217 [inline]) [<80849244>] (debug_check_no_obj_freed) from [<804c067c>] (slab_free mm/slub.c:4474 [inline]) [<80849244>] (debug_check_no_obj_freed) from [<804c067c>] (kmem_cache_free+0x2e0/0x43c mm/slub.c:4549) r10:81c60bf4 r9:8579c800 r8:000b388c r7:8147da7c r6:ddeac88c r5:84fcbc00 r4:82cab780 [<804c039c>] (kmem_cache_free) from [<8147da7c>] (kfree_skbmem+0x94/0xa8 net/core/skbuff.c:1148) r10:81c60bf4 r9:84fcde68 r8:84c0f480 r7:85579ad8 r6:df805c94 r5:81623f4c r4:84fcbc00 [<8147d9e8>] (kfree_skbmem) from [<81485608>] (__kfree_skb net/core/skbuff.c:1205 [inline]) [<8147d9e8>] (kfree_skbmem) from [<81485608>] (consume_skb net/core/skbuff.c:1436 [inline]) [<8147d9e8>] (kfree_skbmem) from [<81485608>] (consume_skb+0x84/0x130 net/core/skbuff.c:1430) [<81485584>] (consume_skb) from [<81623f4c>] (nft_synproxy_eval_v6 net/netfilter/nft_synproxy.c:91 [inline]) [<81485584>] (consume_skb) from [<81623f4c>] (nft_synproxy_do_eval+0x2a4/0x2b4 net/netfilter/nft_synproxy.c:145) r7:85579ad8 r6:df805c94 r5:84119a00 r4:84fcbc00 [<81623ca8>] (nft_synproxy_do_eval) from [<81623f88>] (nft_synproxy_eval+0x14/0x18 net/netfilter/nft_synproxy.c:247) r9:df805d2c r8:81c60d74 r7:81c60ae0 r6:81c60a9c r5:85579ae0 r4:85579ad0 [<81623f74>] (nft_synproxy_eval) from [<815ed7ec>] (expr_call_ops_eval net/netfilter/nf_tables_core.c:240 [inline]) [<81623f74>] (nft_synproxy_eval) from [<815ed7ec>] (nft_do_chain+0x12c/0x570 net/netfilter/nf_tables_core.c:288) [<815ed6c0>] (nft_do_chain) from [<81605f04>] (nft_do_chain_inet+0xac/0x120 net/netfilter/nft_chain_filter.c:161) r10:ddde4ec8 r9:857017a0 r8:df805d84 r7:84fcbc00 r6:85701780 r5:00000004 r4:85701e30 [<81605e58>] (nft_do_chain_inet) from [<815b55e0>] (nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]) [<81605e58>] (nft_do_chain_inet) from [<815b55e0>] (nf_hook_slow+0x40/0x104 net/netfilter/core.c:626) r4:00000001 [<815b55a0>] (nf_hook_slow) from [<81740c48>] (nf_hook include/linux/netfilter.h:269 [inline]) [<815b55a0>] (nf_hook_slow) from [<81740c48>] (NF_HOOK include/linux/netfilter.h:312 [inline]) [<815b55a0>] (nf_hook_slow) from [<81740c48>] (ip6_input+0xb0/0xd0 net/ipv6/ip6_input.c:490) r9:00000040 r8:00000026 r7:00000000 r6:84119a00 r5:847fd000 r4:84fcbc00 [<81740b98>] (ip6_input) from [<817401b4>] (dst_input include/net/dst.h:460 [inline]) [<81740b98>] (ip6_input) from [<817401b4>] (ip6_rcv_finish net/ipv6/ip6_input.c:79 [inline]) [<81740b98>] (ip6_input) from [<817401b4>] (NF_HOOK include/linux/netfilter.h:314 [inline]) [<81740b98>] (ip6_input) from [<817401b4>] (NF_HOOK include/linux/netfilter.h:308 [inline]) [<81740b98>] (ip6_input) from [<817401b4>] (ipv6_rcv+0x150/0x15c net/ipv6/ip6_input.c:309) r6:84119a00 r5:84fcbc00 r4:00000001 [<81740064>] (ipv6_rcv) from [<814a53b4>] (__netif_receive_skb_one_core+0x5c/0x80 net/core/dev.c:5662) r6:00000000 r5:81740064 r4:847fd000 [<814a5358>] (__netif_receive_skb_one_core) from [<814a5420>] (__netif_receive_skb+0x18/0x5c net/core/dev.c:5775) r5:ddde4fb0 r4:84fcbc00 [<814a5408>] (__netif_receive_skb) from [<814a5710>] (process_backlog+0x88/0x15c net/core/dev.c:6107) r5:ddde4fb0 r4:84fcbc00 [<814a5688>] (process_backlog) from [<814a6614>] (__napi_poll+0x34/0x240 net/core/dev.c:6771) r10:ddde4ec0 r9:ddde5100 r8:df805ed0 r7:df805ecb r6:00000040 r5:ddde4fb0 r4:00000001 [<814a65e0>] (__napi_poll) from [<814a6e4c>] (napi_poll net/core/dev.c:6840 [inline]) [<814a65e0>] (__napi_poll) from [<814a6e4c>] (net_rx_action+0x338/0x420 net/core/dev.c:6962) r9:ddde5100 r8:df805ed0 r7:0000012c r6:00024743 r5:ddde4fb0 r4:00000000 [<814a6b14>] (net_rx_action) from [<8024b5e0>] (handle_softirqs+0x158/0x464 kernel/softirq.c:554) r10:00000008 r9:8579c800 r8:00000102 r7:04208060 r6:00000003 r5:00000004 r4:8260408c [<8024b488>] (handle_softirqs) from [<802012d0>] (__do_softirq+0x14/0x18 kernel/softirq.c:588) r10:86002d00 r9:86002dfc r8:00000068 r7:863b0e00 r6:81b8f5a0 r5:00000002 r4:60000113 [<802012bc>] (__do_softirq) from [<80208800>] (____do_softirq+0x10/0x14 arch/arm/kernel/irq.c:77) [<802087f0>] (____do_softirq) from [<81953478>] (call_with_stack+0x1c/0x20 arch/arm/lib/call_with_stack.S:40) [<8195345c>] (call_with_stack) from [<8020883c>] (do_softirq_own_stack+0x38/0x3c arch/arm/kernel/irq.c:82) [<80208804>] (do_softirq_own_stack) from [<8024baf8>] (do_softirq kernel/softirq.c:455 [inline]) [<80208804>] (do_softirq_own_stack) from [<8024baf8>] (do_softirq+0x5c/0x64 kernel/softirq.c:442) [<8024ba9c>] (do_softirq) from [<8024bbcc>] (__local_bh_enable_ip+0xcc/0xd0 kernel/softirq.c:382) r5:00000002 r4:8579c800 [<8024bb00>] (__local_bh_enable_ip) from [<819aea7c>] (__raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline]) [<8024bb00>] (__local_bh_enable_ip) from [<819aea7c>] (_raw_spin_unlock_bh+0x34/0x38 kernel/locking/spinlock.c:210) r5:863b0ee8 r4:84fcb000 [<819aea48>] (_raw_spin_unlock_bh) from [<80d8b3fc>] (spin_unlock_bh include/linux/spinlock.h:396 [inline]) [<819aea48>] (_raw_spin_unlock_bh) from [<80d8b3fc>] (nsim_dev_trap_report drivers/net/netdevsim/dev.c:820 [inline]) [<819aea48>] (_raw_spin_unlock_bh) from [<80d8b3fc>] (nsim_dev_trap_report_work+0x29c/0x33c drivers/net/netdevsim/dev.c:850) [<80d8b160>] (nsim_dev_trap_report_work) from [<80265f98>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3231) r10:82c16205 r9:8579c800 r8:01800000 r7:ddde3f40 r6:82c16200 r5:863b0e00 r4:863f0e80 [<80265de4>] (process_one_work) from [<80266b7c>] (process_scheduled_works kernel/workqueue.c:3312 [inline]) [<80265de4>] (process_one_work) from [<80266b7c>] (worker_thread+0x1ec/0x3bc kernel/workqueue.c:3393) r10:8579c800 r9:863f0eac r8:61c88647 r7:ddde3f60 r6:82604d40 r5:ddde3f40 r4:863f0e80 [<80266990>] (worker_thread) from [<8026fb98>] (kthread+0x104/0x134 kernel/kthread.c:389) r10:00000000 r9:dff71e78 r8:863f5cc0 r7:863f0e80 r6:80266990 r5:8579c800 r4:863f5c40 [<8026fa94>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd8dfb0 to 0xdfd8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fa94 r4:863f5c40