FAT-fs (loop3): Unrecognized mount option "dont_hash" or missing value watchdog: BUG: soft lockup - CPU#1 stuck for 22s! [syz-executor.2:9665] Modules linked in: irq event stamp: 3984225 hardirqs last enabled at (3984224): [] restore_regs_and_return_to_kernel+0x0/0x2a hardirqs last disabled at (3984225): [] apic_timer_interrupt+0x8e/0xa0 arch/x86/entry/entry_64.S:793 softirqs last enabled at (419474): [] __do_softirq+0x68b/0x9ff kernel/softirq.c:314 softirqs last disabled at (421141): [] invoke_softirq kernel/softirq.c:368 [inline] softirqs last disabled at (421141): [] irq_exit+0x193/0x240 kernel/softirq.c:409 CPU: 1 PID: 9665 Comm: syz-executor.2 Not tainted 4.14.267-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 task: ffff888047a6a340 task.stack: ffff888047da8000 RIP: 0010:xfrm_lookup+0x7f/0x1790 net/xfrm/xfrm_policy.c:2012 RSP: 0018:ffff8880ba5079c0 EFLAGS: 00000206 ORIG_RAX: ffffffffffffff10 RAX: ffff888093f76020 RBX: 1ffff110174a0f3e RCX: 0000000000000000 RDX: 0000000000000100 RSI: ffff888093f76000 RDI: ffff88809305c180 RBP: ffff888093f76000 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 R13: ffff8880ba507bd0 R14: ffff88809305c180 R15: dffffc0000000000 FS: 00007fc7ea868700(0000) GS:ffff8880ba500000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000056437301f160 CR3: 0000000098dc3000 CR4: 00000000003406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: icmp6_dst_alloc+0x388/0x580 net/ipv6/route.c:1789 ndisc_send_skb+0xace/0x1390 net/ipv6/ndisc.c:463 ndisc_send_rs+0x125/0x630 net/ipv6/ndisc.c:677 addrconf_rs_timer+0x2bb/0x5a0 net/ipv6/addrconf.c:3769 call_timer_fn+0x14a/0x650 kernel/time/timer.c:1280 expire_timers+0x232/0x4d0 kernel/time/timer.c:1319 __run_timers kernel/time/timer.c:1637 [inline] run_timer_softirq+0x1d5/0x5a0 kernel/time/timer.c:1650 __do_softirq+0x24d/0x9ff kernel/softirq.c:288 invoke_softirq kernel/softirq.c:368 [inline] irq_exit+0x193/0x240 kernel/softirq.c:409 exiting_irq arch/x86/include/asm/apic.h:638 [inline] smp_apic_timer_interrupt+0x141/0x5e0 arch/x86/kernel/apic/apic.c:1106 apic_timer_interrupt+0x93/0xa0 arch/x86/entry/entry_64.S:793 RIP: 0010:get_current arch/x86/include/asm/current.h:15 [inline] RIP: 0010:__sanitizer_cov_trace_pc+0x0/0x50 kernel/kcov.c:60 RSP: 0018:ffff888047daf6f0 EFLAGS: 00000202 ORIG_RAX: ffffffffffffff10 RAX: 0000000000000001 RBX: ffffea0002ce64c0 RCX: 0000000000000001 RDX: ffffffff8182b120 RSI: 0000000000000002 RDI: ffff888047a6abc4 RBP: ffffea0002ce64c0 R08: 0000000000000000 R09: 0000000000020012 R10: ffff888047a6abf0 R11: ffff888047a6a340 R12: ffffea0002ce64c0 R13: ffffea0002ce64c0 R14: 00007fc7eb30b000 R15: 0000000000000000 debug_smp_processor_id+0x5/0x20 lib/smp_processor_id.c:57 rcu_dynticks_curr_cpu_in_eqs kernel/rcu/tree.c:360 [inline] rcu_is_watching+0x11/0xb0 kernel/rcu/tree.c:1130 rcu_read_lock include/linux/rcupdate.h:630 [inline] lock_page_memcg+0x11b/0x200 mm/memcontrol.c:1640 page_remove_file_rmap+0x2d/0x690 mm/rmap.c:1208 page_remove_rmap+0x96/0xe0 mm/rmap.c:1293 zap_pte_range mm/memory.c:1364 [inline] zap_pmd_range mm/memory.c:1466 [inline] zap_pud_range mm/memory.c:1495 [inline] zap_p4d_range mm/memory.c:1516 [inline] unmap_page_range+0xf3f/0x1ce0 mm/memory.c:1537 unmap_single_vma+0x147/0x2b0 mm/memory.c:1582 unmap_vmas+0x9d/0x160 mm/memory.c:1612 exit_mmap+0x270/0x4d0 mm/mmap.c:3058 __mmput kernel/fork.c:931 [inline] mmput kernel/fork.c:952 [inline] mmput+0xfa/0x420 kernel/fork.c:947 exit_mm kernel/exit.c:548 [inline] do_exit+0x984/0x2850 kernel/exit.c:855 do_group_exit+0x100/0x2e0 kernel/exit.c:965 get_signal+0x38d/0x1ca0 kernel/signal.c:2412 do_signal+0x7c/0x1550 arch/x86/kernel/signal.c:792 exit_to_usermode_loop+0x160/0x200 arch/x86/entry/common.c:160 prepare_exit_to_usermode arch/x86/entry/common.c:199 [inline] syscall_return_slowpath arch/x86/entry/common.c:270 [inline] do_syscall_64+0x4a3/0x640 arch/x86/entry/common.c:297 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x7fc7ebef3059 RSP: 002b:00007fc7ea868118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 RAX: fffffffffffffffc RBX: 00007fc7ec005f60 RCX: 00007fc7ebef3059 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000070a60000 RBP: 00007fc7ebf4d08d R08: 0000000020000280 R09: 0000000020000280 R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000000 R13: 00007ffc6557554f R14: 00007fc7ea868300 R15: 0000000000022000 Code: c7 00 f1 f1 f1 f1 c7 40 04 04 f2 04 f2 c7 40 08 04 f2 04 f2 c7 40 0c 00 00 f2 f2 c7 40 10 00 00 f3 f3 e8 c5 e7 26 fb 48 8d 45 20 <48> 89 44 24 10 48 c1 e8 03 42 80 3c 38 00 0f 85 c0 14 00 00 48 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 PID: 9118 Comm: kworker/0:4 Not tainted 4.14.267-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Workqueue: events netstamp_clear task: ffff88808d0a2600 task.stack: ffff88808d060000 RIP: 0010:__read_once_size include/linux/compiler.h:185 [inline] RIP: 0010:csd_lock_wait kernel/smp.c:108 [inline] RIP: 0010:smp_call_function_single+0x181/0x370 kernel/smp.c:302 RSP: 0018:ffff88808d067a40 EFLAGS: 00000297 RAX: ffff88808d0a2600 RBX: 1ffff11011a0cf4c RCX: 1ffff11011a145e9 RDX: 0000000000000000 RSI: ffff88808d0a2f28 RDI: 0000000000000286 RBP: ffff88808d067af0 R08: 0000000000000001 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000001 FS: 0000000000000000(0000) GS:ffff8880ba400000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f6a448bc488 CR3: 000000009ab26000 CR4: 00000000003406f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: smp_call_function_many+0x60f/0x7a0 kernel/smp.c:434 smp_call_function kernel/smp.c:492 [inline] on_each_cpu+0x40/0x210 kernel/smp.c:602 text_poke_bp+0x90/0x110 arch/x86/kernel/alternative.c:796 __jump_label_transform+0x269/0x300 arch/x86/kernel/jump_label.c:102 arch_jump_label_transform+0x26/0x40 arch/x86/kernel/jump_label.c:110 __jump_label_update+0x113/0x170 kernel/jump_label.c:374 jump_label_update kernel/jump_label.c:741 [inline] jump_label_update+0x140/0x2d0 kernel/jump_label.c:720 static_key_enable_cpuslocked+0xf9/0x170 kernel/jump_label.c:141 static_key_enable+0x16/0x20 kernel/jump_label.c:154 netstamp_clear+0x2e/0x50 net/core/dev.c:1752 process_one_work+0x793/0x14a0 kernel/workqueue.c:2117 worker_thread+0x5cc/0xff0 kernel/workqueue.c:2251 kthread+0x30d/0x420 kernel/kthread.c:232 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:404 Code: ca 08 00 48 8b 54 24 10 4c 89 e9 8b 7c 24 1c 48 8d 74 24 40 e8 71 fa ff ff 41 89 c4 8b 44 24 58 a8 01 74 0f e8 e1 c9 08 00 f3 90 <8b> 44 24 58 a8 01 75 f1 e8 d2 c9 08 00 e8 cd c9 08 00 bf 01 00 ---------------- Code disassembly (best guess): 0: c7 00 f1 f1 f1 f1 movl $0xf1f1f1f1,(%rax) 6: c7 40 04 04 f2 04 f2 movl $0xf204f204,0x4(%rax) d: c7 40 08 04 f2 04 f2 movl $0xf204f204,0x8(%rax) 14: c7 40 0c 00 00 f2 f2 movl $0xf2f20000,0xc(%rax) 1b: c7 40 10 00 00 f3 f3 movl $0xf3f30000,0x10(%rax) 22: e8 c5 e7 26 fb callq 0xfb26e7ec 27: 48 8d 45 20 lea 0x20(%rbp),%rax * 2b: 48 89 44 24 10 mov %rax,0x10(%rsp) <-- trapping instruction 30: 48 c1 e8 03 shr $0x3,%rax 34: 42 80 3c 38 00 cmpb $0x0,(%rax,%r15,1) 39: 0f 85 c0 14 00 00 jne 0x14ff 3f: 48 rex.W