INFO: task kworker/1:143:3791 blocked for more than 433 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:143 state:D stack:0 pid:3791 tgid:3791 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3d2bc>] (__schedule) from [<81a3e250>] (__schedule_loop kernel/sched/core.c:7043 [inline]) [<81a3d2bc>] (__schedule) from [<81a3e250>] (schedule+0x2c/0x130 kernel/sched/core.c:7058) r10:e86d9d84 r9:00000002 r8:60010013 r7:82916594 r6:e86d9d8c r5:86d71800 r4:86d71800 [<81a3e224>] (schedule) from [<81a3e638>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7115) r5:86d71800 r4:82916590 [<81a3e620>] (schedule_preempt_disabled) from [<81a411e8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3e620>] (schedule_preempt_disabled) from [<81a411e8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a40e98>] (__mutex_lock.constprop.0) from [<81a41990>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e86d9e08 r4:00000000 [<81a4197c>] (__mutex_lock_slowpath) from [<81a419d0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a41994>] (mutex_lock) from [<804e0514>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e04ac>] (_vm_unmap_aliases) from [<804e42f4>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e04ac>] (_vm_unmap_aliases) from [<804e42f4>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d73540 r4:00000000 [<804e4188>] (vfree) from [<8054cf54>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018205 r8:86d71800 r7:00000000 r6:83018200 r5:00001000 r4:7f007000 [<8054cf24>] (execmem_free) from [<803c3358>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:df841000 [<803c3348>] (bpf_jit_free_exec) from [<803c3738>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c3348>] (bpf_jit_free_exec) from [<803c3738>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c36d0>] (bpf_jit_free) from [<803c47e0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2923) r5:86ee5b8c r4:85dcf480 [<803c46a0>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:ddde2d40 r6:83018200 r5:86ee5b8c r4:85dcf480 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:86d71800 r8:85dcf4ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85dcf480 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85dcf480 r8:8027ade4 r7:e4679e60 r6:85dcf280 r5:86d71800 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe86d9fb0 to 0xe86d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:86c92700 INFO: task kworker/1:143:3791 is blocked on a mutex likely owned by task kworker/0:52:3838. task:kworker/0:52 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3d2bc>] (__schedule) from [<81a3e684>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7288) r10:8280c9b4 r9:86131800 r8:80200c04 r7:e05cdd54 r6:ffffffff r5:86131800 r4:00000000 [<81a3e644>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xe05cdd20 to 0xe05cdd68) dd20: bfe85000 ea803000 00000001 80239bb8 7f007000 00000001 82ac8f44 82ac8320 dd40: 7f007000 ea803000 8280c9b4 e05cdd9c e05cdda0 e05cdd70 80230af0 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e02d8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82ac8f64 [<804e0054>] (__purge_vmap_area_lazy) from [<804e0690>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05cddc0 r5:e05cde08 r4:e05cddc0 [<804e04ac>] (_vm_unmap_aliases) from [<804e42f4>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e04ac>] (_vm_unmap_aliases) from [<804e42f4>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8582d140 r4:00000000 [<804e4188>] (vfree) from [<8054cf54>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:86131800 r7:00000000 r6:83018000 r5:00001000 r4:7f007000 [<8054cf24>] (execmem_free) from [<803c3358>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:df849000 [<803c3348>] (bpf_jit_free_exec) from [<803c3738>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c3348>] (bpf_jit_free_exec) from [<803c3738>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c36d0>] (bpf_jit_free) from [<803c47e0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2923) r5:84eb578c r4:8609ba80 [<803c46a0>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:84eb578c r4:8609ba80 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:86131800 r8:8609baac r7:82804d40 r6:dddced40 r5:dddced60 r4:8609ba80 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8609ba80 r8:8027ade4 r7:e05bde60 r6:8613b280 r5:86131800 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05cdfb0 to 0xe05cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:87139c40 INFO: task kworker/0:50:3812 blocked for more than 434 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:50 state:D stack:0 pid:3812 tgid:3812 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3d2bc>] (__schedule) from [<81a3e250>] (__schedule_loop kernel/sched/core.c:7043 [inline]) [<81a3d2bc>] (__schedule) from [<81a3e250>] (schedule+0x2c/0x130 kernel/sched/core.c:7058) r10:e86e9d84 r9:00000002 r8:60010113 r7:82916594 r6:e86e9d8c r5:84b52400 r4:84b52400 [<81a3e224>] (schedule) from [<81a3e638>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:7115) r5:84b52400 r4:82916590 [<81a3e620>] (schedule_preempt_disabled) from [<81a411e8>] (__mutex_lock_common kernel/locking/mutex.c:676 [inline]) [<81a3e620>] (schedule_preempt_disabled) from [<81a411e8>] (__mutex_lock.constprop.0+0x350/0xa24 kernel/locking/mutex.c:760) [<81a40e98>] (__mutex_lock.constprop.0) from [<81a41990>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1049) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e86e9e08 r4:00000000 [<81a4197c>] (__mutex_lock_slowpath) from [<81a419d0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:274) [<81a41994>] (mutex_lock) from [<804e0514>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e04ac>] (_vm_unmap_aliases) from [<804e42f4>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e04ac>] (_vm_unmap_aliases) from [<804e42f4>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85882b00 r4:00000000 [<804e4188>] (vfree) from [<8054cf54>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:84b52400 r7:00000000 r6:83018000 r5:00001000 r4:7f005000 [<8054cf24>] (execmem_free) from [<803c3358>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:df883000 [<803c3348>] (bpf_jit_free_exec) from [<803c3738>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c3348>] (bpf_jit_free_exec) from [<803c3738>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c36d0>] (bpf_jit_free) from [<803c47e0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2923) r5:84eb5f8c r4:85500880 [<803c46a0>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:84eb5f8c r4:85500880 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b52400 r8:855008ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85500880 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85500880 r8:8027ade4 r7:e86e5e60 r6:8595b980 r5:84b52400 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe86e9fb0 to 0xe86e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:85e33480 INFO: task kworker/0:50:3812 is blocked on a mutex likely owned by task kworker/0:52:3838. task:kworker/0:52 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a3d2bc>] (__schedule) from [<81a3e684>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7288) r10:8280c9b4 r9:86131800 r8:80200c04 r7:e05cdd54 r6:ffffffff r5:86131800 r4:00000000 [<81a3e644>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) Exception stack(0xe05cdd20 to 0xe05cdd68) dd20: c0ae5000 ea803000 00000001 80239bb8 7f007000 00000001 82ac8f44 82ac8320 dd40: 7f007000 ea803000 8280c9b4 e05cdd9c e05cdda0 e05cdd70 80230af0 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e02d8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:82ac8f64 [<804e0054>] (__purge_vmap_area_lazy) from [<804e0690>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05cddc0 r5:e05cde08 r4:e05cddc0 [<804e04ac>] (_vm_unmap_aliases) from [<804e42f4>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e04ac>] (_vm_unmap_aliases) from [<804e42f4>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8582d140 r4:00000000 [<804e4188>] (vfree) from [<8054cf54>] (execmem_free+0x30/0x50 mm/execmem.c:506) r9:83018005 r8:86131800 r7:00000000 r6:83018000 r5:00001000 r4:7f007000 [<8054cf24>] (execmem_free) from [<803c3358>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1084) r5:00001000 r4:df849000 [<803c3348>] (bpf_jit_free_exec) from [<803c3738>] (bpf_jit_binary_free kernel/bpf/core.c:1130 [inline]) [<803c3348>] (bpf_jit_free_exec) from [<803c3738>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1253) [<803c36d0>] (bpf_jit_free) from [<803c47e0>] (bpf_prog_free_deferred+0x140/0x158 kernel/bpf/core.c:2923) r5:84eb578c r4:8609ba80 [<803c46a0>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r7:dddced40 r6:83018000 r5:84eb578c r4:8609ba80 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:86131800 r8:8609baac r7:82804d40 r6:dddced40 r5:dddced60 r4:8609ba80 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:8609ba80 r8:8027ade4 r7:e05bde60 r6:8613b280 r5:86131800 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05cdfb0 to 0xe05cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:87139c40 NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 32 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT Hardware name: ARM-Versatile Express Call trace: [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c arch/arm/kernel/traps.c:257) r7:00000000 r6:00000013 r5:60000093 r4:82260afc [<80201b08>] (show_stack) from [<8021fc00>] (__dump_stack lib/dump_stack.c:94 [inline]) [<80201b08>] (show_stack) from [<8021fc00>] (dump_stack_lvl+0x70/0x7c lib/dump_stack.c:120) [<8021fb90>] (dump_stack_lvl) from [<8021fc24>] (dump_stack+0x18/0x1c lib/dump_stack.c:129) r5:00000001 r4:00000001 [<8021fc0c>] (dump_stack) from [<81a26ed0>] (nmi_cpu_backtrace+0x160/0x17c lib/nmi_backtrace.c:113) [<81a26d70>] (nmi_cpu_backtrace) from [<81a2701c>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8 lib/nmi_backtrace.c:62) r7:00000001 r6:8280c690 r5:8281ac94 r4:ffffffff [<81a26eec>] (nmi_trigger_cpumask_backtrace) from [<802304fc>] (arch_trigger_cpumask_backtrace+0x18/0x1c arch/arm/kernel/smp.c:852) r9:82abd564 r8:82804d40 r7:000ae7a4 r6:00007f22 r5:8281b248 r4:86c3b50c [<802304e4>] (arch_trigger_cpumask_backtrace) from [<8037d980>] (trigger_all_cpu_backtrace include/linux/nmi.h:160 [inline]) [<802304e4>] (arch_trigger_cpumask_backtrace) from [<8037d980>] (check_hung_uninterruptible_tasks kernel/hung_task.c:328 [inline]) [<802304e4>] (arch_trigger_cpumask_backtrace) from [<8037d980>] (watchdog+0x4d4/0x81c kernel/hung_task.c:491) [<8037d4ac>] (watchdog) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:00000000 r8:8037d4ac r7:8332a700 r6:8332a700 r5:83391800 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf8e1fb0 to 0xdf8e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:832c2a00 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 23014 Comm: kworker/u9:3 Not tainted syzkaller #0 PREEMPT Hardware name: ARM-Versatile Express Workqueue: events_unbound nsim_dev_trap_report_work PC is at ___slab_alloc+0xf4/0xaa0 mm/slub.c:3826 LR is at debug_smp_processor_id+0x20/0x24 lib/smp_processor_id.c:58 pc : [<805014b8>] lr : [<81a3a738>] psr: 20000113 sp : df8019c8 ip : df8019b8 fp : df801a5c r10: ffffffff r9 : 830a7cc0 r8 : 40000113 r7 : 40000113 r6 : ddece540 r5 : dddd3450 r4 : 00000000 r3 : 00000103 r2 : 00000103 r1 : 82260afc r0 : 00000000 Flags: nzCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user Control: 30c5387d Table: 8582d340 DAC: fffffffd Call trace: frame pointer underflow [<805013c4>] (___slab_alloc) from [<80502364>] (__slab_alloc.constprop.0+0x64/0xa8 mm/slub.c:3992) r10:00082820 r9:00000240 r8:81550740 r7:ffffffff r6:00082820 r5:830a7cc0 r4:dddd3450 [<80502300>] (__slab_alloc.constprop.0) from [<80503388>] (__slab_alloc_node mm/slub.c:4067 [inline]) [<80502300>] (__slab_alloc.constprop.0) from [<80503388>] (slab_alloc_node mm/slub.c:4228 [inline]) [<80502300>] (__slab_alloc.constprop.0) from [<80503388>] (kmem_cache_alloc_node_noprof+0x11c/0x338 mm/slub.c:4292) r8:00000000 r7:85461800 r6:00082820 r5:00000000 r4:830a7cc0 [<8050326c>] (kmem_cache_alloc_node_noprof) from [<81550740>] (kmalloc_reserve+0x94/0xfc net/core/skbuff.c:578) r10:00082820 r9:00000000 r8:828060c0 r7:ffffffff r6:df801b23 r5:df801b1c r4:00000820 [<815506ac>] (kmalloc_reserve) from [<81551c70>] (__alloc_skb+0x94/0x160 net/core/skbuff.c:669) r10:00000100 r9:85ed18c0 r8:00000820 r7:00000000 r6:830a7c00 r5:ffffffff r4:86795780 r3:df801b23 [<81551bdc>] (__alloc_skb) from [<816cfccc>] (alloc_skb include/linux/skbuff.h:1336 [inline]) [<81551bdc>] (__alloc_skb) from [<816cfccc>] (synproxy_send_client_synack+0x7c/0x1e8 net/netfilter/nf_synproxy_core.c:460) r8:85ed19d4 r7:df801bb0 r6:86795c00 r5:00000000 r4:86795c00 [<816cfc50>] (synproxy_send_client_synack) from [<8170a160>] (nft_synproxy_eval_v4 net/netfilter/nft_synproxy.c:59 [inline]) [<816cfc50>] (synproxy_send_client_synack) from [<8170a160>] (nft_synproxy_do_eval+0x25c/0x2b4 net/netfilter/nft_synproxy.c:141) r10:81e6fec8 r9:85ed19d4 r8:84a04940 r7:8732dbd8 r6:df801c7c r5:85722c40 r4:86795c00 [<81709f04>] (nft_synproxy_do_eval) from [<8170a1e4>] (nft_synproxy_eval+0x14/0x18 net/netfilter/nft_synproxy.c:247) r9:df801d14 r8:81e70050 r7:81e6fdb4 r6:81e6fd70 r5:8732dbe0 r4:8732dbd0 [<8170a1d0>] (nft_synproxy_eval) from [<816d2a88>] (expr_call_ops_eval net/netfilter/nf_tables_core.c:237 [inline]) [<8170a1d0>] (nft_synproxy_eval) from [<816d2a88>] (nft_do_chain+0x12c/0x570 net/netfilter/nf_tables_core.c:285) [<816d295c>] (nft_do_chain) from [<816ec140>] (nft_do_chain_inet+0xac/0x120 net/netfilter/nft_chain_filter.c:161) r10:dddcfe88 r9:8732d480 r8:df801d6c r7:86795c00 r6:8732d480 r5:00000000 r4:846d6940 [<816ec094>] (nft_do_chain_inet) from [<8169a154>] (nf_hook_entry_hookfn include/linux/netfilter.h:158 [inline]) [<816ec094>] (nft_do_chain_inet) from [<8169a154>] (nf_hook_slow+0x40/0x104 net/netfilter/core.c:623) r4:86795c00 [<8169a114>] (nf_hook_slow) from [<8172bdd8>] (nf_hook include/linux/netfilter.h:273 [inline]) [<8169a114>] (nf_hook_slow) from [<8172bdd8>] (NF_HOOK include/linux/netfilter.h:316 [inline]) [<8169a114>] (nf_hook_slow) from [<8172bdd8>] (ip_local_deliver+0xf0/0x110 net/ipv4/ip_input.c:260) r9:00000040 r8:0000002c r7:00000000 r6:85722c40 r5:85f8f000 r4:86795c00 [<8172bce8>] (ip_local_deliver) from [<8172ae7c>] (dst_input include/net/dst.h:471 [inline]) [<8172bce8>] (ip_local_deliver) from [<8172ae7c>] (ip_rcv_finish+0x98/0xb0 net/ipv4/ip_input.c:454) r6:85f8f000 r5:85722c40 r4:86795c00 [<8172ade4>] (ip_rcv_finish) from [<8172becc>] (NF_HOOK include/linux/netfilter.h:318 [inline]) [<8172ade4>] (ip_rcv_finish) from [<8172becc>] (NF_HOOK include/linux/netfilter.h:312 [inline]) [<8172ade4>] (ip_rcv_finish) from [<8172becc>] (ip_rcv+0xd4/0xe0 net/ipv4/ip_input.c:574) r7:00000000 r6:85722c40 r5:86795c00 r4:00000001 [<8172bdf8>] (ip_rcv) from [<8157c9e8>] (__netif_receive_skb_one_core+0x5c/0x80 net/core/dev.c:5991) r6:00000000 r5:8172bdf8 r4:85f8f000 [<8157c98c>] (__netif_receive_skb_one_core) from [<8157ca54>] (__netif_receive_skb+0x18/0x5c net/core/dev.c:6104) r5:dddcff70 r4:86795c00 [<8157ca3c>] (__netif_receive_skb) from [<8157cd5c>] (process_backlog+0xa0/0x17c net/core/dev.c:6456) r5:dddcff70 r4:86795c00 [<8157ccbc>] (process_backlog) from [<8157d5b8>] (__napi_poll+0x34/0x240 net/core/dev.c:7506) r10:dddcfe80 r9:00000000 r8:df801ed8 r7:df801ed3 r6:00000040 r5:dddcff70 r4:00000001 [<8157d584>] (__napi_poll) from [<8157dea4>] (napi_poll net/core/dev.c:7569 [inline]) [<8157d584>] (__napi_poll) from [<8157dea4>] (net_rx_action+0x3a0/0x430 net/core/dev.c:7696) r9:00000000 r8:df801ed8 r7:0000012c r6:00000000 r5:5b70d000 r4:dddcff70 [<8157db04>] (net_rx_action) from [<8025de30>] (handle_softirqs+0x140/0x458 kernel/softirq.c:579) r10:85461800 r9:82804d40 r8:00000102 r7:00000003 r6:00000008 r5:00000004 r4:8280408c [<8025dcf0>] (handle_softirqs) from [<802012f0>] (__do_softirq+0x14/0x18 kernel/softirq.c:613) r10:84bf9900 r9:86e76b80 r8:84bf9a00 r7:00000030 r6:81d94828 r5:00000002 r4:60000113 [<802012dc>] (__do_softirq) from [<8022858c>] (____do_softirq+0x10/0x14 arch/arm/kernel/irq.c:77) [<8022857c>] (____do_softirq) from [<81a09004>] (call_with_stack+0x1c/0x20 arch/arm/lib/call_with_stack.S:40) [<81a08fe8>] (call_with_stack) from [<802285c8>] (do_softirq_own_stack+0x38/0x3c arch/arm/kernel/irq.c:82) [<80228590>] (do_softirq_own_stack) from [<8025e438>] (do_softirq kernel/softirq.c:480 [inline]) [<80228590>] (do_softirq_own_stack) from [<8025e438>] (do_softirq+0x5c/0x64 kernel/softirq.c:467) [<8025e3dc>] (do_softirq) from [<8025e50c>] (__local_bh_enable_ip+0xcc/0xd0 kernel/softirq.c:407) r5:00000002 r4:85461800 [<8025e440>] (__local_bh_enable_ip) from [<81a47138>] (__raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline]) [<8025e440>] (__local_bh_enable_ip) from [<81a47138>] (_raw_spin_unlock_bh+0x34/0x38 kernel/locking/spinlock.c:210) r5:86e76b30 r4:8653b3c0 [<81a47104>] (_raw_spin_unlock_bh) from [<80e493ec>] (spin_unlock_bh include/linux/spinlock.h:396 [inline]) [<81a47104>] (_raw_spin_unlock_bh) from [<80e493ec>] (nsim_dev_trap_report drivers/net/netdevsim/dev.c:835 [inline]) [<81a47104>] (_raw_spin_unlock_bh) from [<80e493ec>] (nsim_dev_trap_report_work+0x2e4/0x410 drivers/net/netdevsim/dev.c:866) [<80e49108>] (nsim_dev_trap_report_work) from [<8027a398>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3236) r10:8300e470 r9:8301cc05 r8:85461800 r7:8300fe00 r6:8301cc00 r5:86e76b80 r4:85716800 [<8027a1e4>] (process_one_work) from [<8027afe0>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85461800 r8:8571682c r7:82804d40 r6:8300fe00 r5:8300fe20 r4:85716800 [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280 kernel/kthread.c:463) r10:00000000 r9:85716800 r8:8027ade4 r7:ea711e60 r6:85716480 r5:85461800 r4:00000001 [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf29fb0 to 0xeaf29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 r4:85a7e800