8021q: adding VLAN 0 to HW filter on device bond0 IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready 8021q: adding VLAN 0 to HW filter on device team0 FAT-fs (loop5): Directory bread(block 6) failed watchdog: BUG: soft lockup - CPU#0 stuck for 22s! [syz-executor.0:12467] Modules linked in: irq event stamp: 58128 hardirqs last enabled at (58127): [] restore_regs_and_return_to_kernel+0x0/0x2a hardirqs last disabled at (58128): [] apic_timer_interrupt+0x8e/0xa0 arch/x86/entry/entry_64.S:793 softirqs last enabled at (53248): [] __do_softirq+0x68b/0x9ff kernel/softirq.c:314 softirqs last disabled at (53147): [] invoke_softirq kernel/softirq.c:368 [inline] softirqs last disabled at (53147): [] irq_exit+0x193/0x240 kernel/softirq.c:409 CPU: 0 PID: 12467 Comm: syz-executor.0 Not tainted 4.14.258-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 task: ffff88806b076200 task.stack: ffff88805c1e0000 RIP: 0010:bytes_is_nonzero mm/kasan/kasan.c:167 [inline] RIP: 0010:memory_is_nonzero mm/kasan/kasan.c:184 [inline] RIP: 0010:memory_is_poisoned_n mm/kasan/kasan.c:210 [inline] RIP: 0010:memory_is_poisoned mm/kasan/kasan.c:241 [inline] RIP: 0010:check_memory_region_inline mm/kasan/kasan.c:257 [inline] RIP: 0010:check_memory_region+0xcb/0x170 mm/kasan/kasan.c:267 RSP: 0018:ffff88805c1e7250 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff10 RAX: ffffed10142bbed5 RBX: ffffed10142bbed6 RCX: ffffffff81636db9 RDX: ffffed10142bbed6 RSI: 0000000000000008 RDI: ffff8880a15df6a8 RBP: ffffed10142bbed5 R08: 0000000000000001 R09: ffffed10142bbed5 R10: ffff8880a15df6af R11: 0000002c7ff1c5f7 R12: 0000000000000008 R13: ffff88805c1e7360 R14: ffff88805c1e7528 R15: 0000000000000008 FS: 00007f4e742cf700(0000) GS:ffff8880ba400000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000020fc8000 CR3: 0000000099067000 CR4: 00000000003406f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: memcpy+0x35/0x50 mm/kasan/kasan.c:303 memcpy include/linux/string.h:376 [inline] memcpy_common kernel/events/internal.h:172 [inline] __output_copy kernel/events/internal.h:176 [inline] perf_output_read_group kernel/events/core.c:5899 [inline] perf_output_read+0x6c9/0x1090 kernel/events/core.c:5932 perf_output_sample+0xa28/0x16f0 kernel/events/core.c:5974 __perf_event_output kernel/events/core.c:6287 [inline] perf_event_output_forward+0xf8/0x1f0 kernel/events/core.c:6300 __perf_event_overflow+0x113/0x310 kernel/events/core.c:7549 perf_swevent_overflow kernel/events/core.c:7625 [inline] perf_swevent_event+0x299/0x460 kernel/events/core.c:7653 do_perf_sw_event kernel/events/core.c:7766 [inline] ___perf_sw_event+0x2a1/0x480 kernel/events/core.c:7797 __perf_sw_event+0x4f/0x100 kernel/events/core.c:7809 perf_sw_event include/linux/perf_event.h:1046 [inline] __do_page_fault+0x692/0xad0 arch/x86/mm/fault.c:1483 page_fault+0x25/0x50 arch/x86/entry/entry_64.S:1123 RIP: 0010:copy_user_enhanced_fast_string+0xe/0x20 arch/x86/lib/copy_user_64.S:181 RSP: 0018:ffff88805c1e7a60 EFLAGS: 00050206 RAX: ffffed100b821000 RBX: 0000000000008000 RCX: 0000000000005acb RDX: 0000000000008000 RSI: 0000000020fc8000 RDI: ffff88805c102535 RBP: 0000000020fc5acb R08: 0000000000000001 R09: ffffed100b820fff R10: ffff88805c107fff R11: 0000000000000000 R12: ffff88805c100000 R13: 00007ffffffff000 R14: 0000000020fcdacb R15: ffff88806c68c440 copy_user_generic arch/x86/include/asm/uaccess_64.h:37 [inline] raw_copy_from_user arch/x86/include/asm/uaccess_64.h:55 [inline] copyin+0x99/0xc0 lib/iov_iter.c:146 _copy_from_iter_full+0x19c/0x760 lib/iov_iter.c:608 copy_from_iter_full include/linux/uio.h:126 [inline] skb_do_copy_data_nocache include/net/sock.h:1892 [inline] skb_copy_to_page_nocache include/net/sock.h:1918 [inline] tcp_sendmsg_locked+0x23fc/0x2ef0 net/ipv4/tcp.c:1360 tcp_sendmsg+0x2b/0x40 net/ipv4/tcp.c:1457 inet_sendmsg+0x11a/0x4e0 net/ipv4/af_inet.c:762 sock_sendmsg_nosec net/socket.c:646 [inline] sock_sendmsg+0xb5/0x100 net/socket.c:656 SYSC_sendto net/socket.c:1763 [inline] SyS_sendto+0x1c7/0x2c0 net/socket.c:1731 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x7f4e75959e99 RSP: 002b:00007f4e742cf168 EFLAGS: 00000246 ORIG_RAX: 000000000000002c RAX: ffffffffffffffda RBX: 00007f4e75a6cf60 RCX: 00007f4e75959e99 RDX: ffffffffffffffef RSI: 0000000020d7cfcb RDI: 000000000000000e RBP: 00007f4e759b3ff1 R08: 0000000000000000 R09: 0000000000000053 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007fff42bc250f R14: 00007f4e742cf300 R15: 0000000000022000 Code: 74 0e 80 38 00 74 f2 48 85 c0 0f 85 9c 00 00 00 5b 5d 41 5c c3 48 85 d2 74 f6 48 01 ea eb 09 48 83 c0 01 48 39 d0 74 e8 80 38 00 <74> f2 eb d8 41 bc 08 00 00 00 48 89 ea 45 29 dc 4e 8d 5c 25 00 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 PID: 9375 Comm: kworker/u4:6 Not tainted 4.14.258-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Workqueue: bat_events batadv_nc_worker task: ffff8880a246a1c0 task.stack: ffff88806d570000 RIP: 0010:hlock_class kernel/locking/lockdep.c:155 [inline] RIP: 0010:mark_lock+0x7f/0x1050 kernel/locking/lockdep.c:3168 RSP: 0018:ffff88806d577ba8 EFLAGS: 00000006 RAX: 00000000000005cc RBX: 0000000000079bc0 RCX: 1ffff1101448d54d RDX: 0000000000000000 RSI: ffff8880a246aa48 RDI: ffff8880a246a1c0 RBP: ffff8880a246aa48 R08: 0000000000000001 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000040 R13: ffff8880a246a1c0 R14: ffff8880a246aa68 R15: 0000000000000006 FS: 0000000000000000(0000) GS:ffff8880ba500000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000055d9a8cbdad8 CR3: 00000000afe20000 CR4: 00000000003406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: mark_held_locks+0xa6/0xf0 kernel/locking/lockdep.c:2854 __trace_hardirqs_on_caller kernel/locking/lockdep.c:2883 [inline] trace_hardirqs_on_caller+0x3a8/0x580 kernel/locking/lockdep.c:2930 __local_bh_enable_ip+0xc1/0x170 kernel/softirq.c:190 spin_unlock_bh include/linux/spinlock.h:362 [inline] batadv_nc_purge_paths+0x20c/0x300 net/batman-adv/network-coding.c:481 batadv_nc_worker+0x628/0xc50 net/batman-adv/network-coding.c:729 process_one_work+0x793/0x14a0 kernel/workqueue.c:2117 worker_thread+0x5cc/0xff0 kernel/workqueue.c:2251 kthread+0x30d/0x420 kernel/kthread.c:232 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:404 Code: 00 00 00 00 fc ff df 4c 89 f1 48 c1 e9 03 0f b6 14 11 84 d2 74 09 80 fa 03 0f 8e b7 07 00 00 25 ff 1f 00 00 48 69 d8 50 01 00 00 <48> 81 eb 50 01 00 00 48 81 c3 00 5b 9e 8b 48 8d 7b 30 48 b8 00 ---------------- Code disassembly (best guess): 0: 74 0e je 0x10 2: 80 38 00 cmpb $0x0,(%rax) 5: 74 f2 je 0xfffffff9 7: 48 85 c0 test %rax,%rax a: 0f 85 9c 00 00 00 jne 0xac 10: 5b pop %rbx 11: 5d pop %rbp 12: 41 5c pop %r12 14: c3 retq 15: 48 85 d2 test %rdx,%rdx 18: 74 f6 je 0x10 1a: 48 01 ea add %rbp,%rdx 1d: eb 09 jmp 0x28 1f: 48 83 c0 01 add $0x1,%rax 23: 48 39 d0 cmp %rdx,%rax 26: 74 e8 je 0x10 28: 80 38 00 cmpb $0x0,(%rax) * 2b: 74 f2 je 0x1f <-- trapping instruction 2d: eb d8 jmp 0x7 2f: 41 bc 08 00 00 00 mov $0x8,%r12d 35: 48 89 ea mov %rbp,%rdx 38: 45 29 dc sub %r11d,%r12d 3b: 4e 8d 5c 25 00 lea 0x0(%rbp,%r12,1),%r11