INFO: task syz-executor.0:26407 blocked for more than 140 seconds. Not tainted 4.14.229-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. syz-executor.0 D28912 26407 7990 0x00000004 Call Trace: context_switch kernel/sched/core.c:2808 [inline] __schedule+0x88b/0x1de0 kernel/sched/core.c:3384 schedule+0x8d/0x1b0 kernel/sched/core.c:3428 schedule_timeout+0x80a/0xe90 kernel/time/timer.c:1724 do_wait_for_common kernel/sched/completion.c:91 [inline] __wait_for_common kernel/sched/completion.c:112 [inline] wait_for_common+0x272/0x430 kernel/sched/completion.c:123 kthread_stop+0xce/0x640 kernel/kthread.c:555 kvm_mmu_pre_destroy_vm+0x41/0x50 arch/x86/kvm/mmu.c:5903 kvm_destroy_vm arch/x86/kvm/../../../virt/kvm/kvm_main.c:769 [inline] kvm_put_kvm+0x30a/0xa90 arch/x86/kvm/../../../virt/kvm/kvm_main.c:806 kvm_vm_release+0x3f/0x50 arch/x86/kvm/../../../virt/kvm/kvm_main.c:817 __fput+0x25f/0x7a0 fs/file_table.c:210 task_work_run+0x11f/0x190 kernel/task_work.c:113 tracehook_notify_resume include/linux/tracehook.h:191 [inline] exit_to_usermode_loop+0x1ad/0x200 arch/x86/entry/common.c:164 prepare_exit_to_usermode arch/x86/entry/common.c:199 [inline] syscall_return_slowpath arch/x86/entry/common.c:270 [inline] do_syscall_64+0x4a3/0x640 arch/x86/entry/common.c:297 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x41926b RSP: 002b:00007ffd58602560 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 RAX: 0000000000000000 RBX: 0000000000000005 RCX: 000000000041926b RDX: 0000000000570190 RSI: 00000000089075c3 RDI: 0000000000000004 RBP: 0000000000000001 R08: 0000000000000000 R09: 0000001b2eb21f08 R10: 00007ffd58602650 R11: 0000000000000293 R12: 000000000008aa50 R13: 00000000000003e8 R14: 000000000056bf60 R15: 000000000008aa40 Showing all locks held in the system: 1 lock held by khungtaskd/1532: #0: (tasklist_lock){.+.+}, at: [] debug_show_all_locks+0x7c/0x21a kernel/locking/lockdep.c:4548 ============================================= NMI backtrace for cpu 0 CPU: 0 PID: 1532 Comm: khungtaskd Not tainted 4.14.229-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 nmi_cpu_backtrace.cold+0x57/0x93 lib/nmi_backtrace.c:101 nmi_trigger_cpumask_backtrace+0x13a/0x180 lib/nmi_backtrace.c:62 trigger_all_cpu_backtrace include/linux/nmi.h:140 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:195 [inline] watchdog+0x5b9/0xb40 kernel/hung_task.c:274 kthread+0x30d/0x420 kernel/kthread.c:232 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:404 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 PID: 4620 Comm: systemd-journal Not tainted 4.14.229-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 task: ffff8880a1bf6040 task.stack: ffff8880a1bf8000 RIP: 0010:__sanitizer_cov_trace_pc+0x23/0x50 kernel/kcov.c:68 RSP: 0018:ffff8880a1bff9f0 EFLAGS: 00000246 RAX: ffff8880a1bf6040 RBX: 0000000000000000 RCX: 1ffffffff11985ad RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffffff88e0dba8 RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000020012 R10: ffff8880a1bf68c8 R11: ffff8880a1bf6040 R12: dffffc0000000000 R13: 0000000000000000 R14: 00007fbe32ff49c7 R15: 0000000000000020 FS: 00007fbe33d398c0(0000) GS:ffff8880ba500000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fbe31314000 CR3: 00000000a1421000 CR4: 00000000001426e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: bpf_prog_kallsyms_find.part.0+0x164/0x240 kernel/bpf/core.c:424 bpf_prog_kallsyms_find include/linux/rcupdate.h:630 [inline] is_bpf_text_address+0x13b/0x150 kernel/bpf/core.c:457 kernel_text_address kernel/extable.c:150 [inline] kernel_text_address+0xbd/0xf0 kernel/extable.c:120 __kernel_text_address+0x9/0x30 kernel/extable.c:105 unwind_get_return_address arch/x86/kernel/unwind_orc.c:252 [inline] unwind_get_return_address+0x51/0x90 arch/x86/kernel/unwind_orc.c:247 __save_stack_trace+0xa0/0x160 arch/x86/kernel/stacktrace.c:45 save_stack mm/kasan/kasan.c:447 [inline] set_track mm/kasan/kasan.c:459 [inline] kasan_kmalloc+0xeb/0x160 mm/kasan/kasan.c:551 slab_post_alloc_hook mm/slab.h:442 [inline] slab_alloc mm/slab.c:3390 [inline] kmem_cache_alloc_trace+0x11b/0x3d0 mm/slab.c:3616 kmalloc include/linux/slab.h:488 [inline] kzalloc include/linux/slab.h:661 [inline] aa_alloc_task_context+0x4d/0x90 security/apparmor/context.c:40 apparmor_cred_prepare+0x1a/0xb0 security/apparmor/lsm.c:84 security_prepare_creds+0x76/0xb0 security/security.c:1008 prepare_creds+0x2ef/0x490 kernel/cred.c:282 SYSC_faccessat fs/open.c:365 [inline] SyS_faccessat+0x7b/0x680 fs/open.c:353 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x7fbe32ff49c7 RSP: 002b:00007fff46f94a98 EFLAGS: 00000246 ORIG_RAX: 0000000000000015 RAX: ffffffffffffffda RBX: 00007fff46f97ac0 RCX: 00007fbe32ff49c7 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00005556545829a3 RBP: 00007fff46f94be0 R08: 00005556545783e5 R09: 0000000000000018 R10: 0000000000000069 R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000000 R14: 00005556563408a0 R15: 00007fff46f950d0 Code: 90 90 90 90 90 90 90 90 65 48 8b 04 25 80 df 01 00 48 85 c0 74 1a 65 8b 15 db b9 ac 7e 81 e2 00 01 1f 00 75 0b 8b 90 58 13 00 00 <83> fa 01 74 01 c3 48 8b 34 24 48 8b 88 60 13 00 00 8b 80 5c 13