watchdog: BUG: soft lockup - CPU#0 stuck for 22s! [syz-executor6:4479] Modules linked in: irq event stamp: 14784906 hardirqs last enabled at (14784905): [] seqcount_lockdep_reader_access include/linux/seqlock.h:83 [inline] hardirqs last enabled at (14784905): [] read_seqcount_begin include/linux/seqlock.h:164 [inline] hardirqs last enabled at (14784905): [] read_seqbegin include/linux/seqlock.h:433 [inline] hardirqs last enabled at (14784905): [] read_seqbegin_or_lock include/linux/seqlock.h:529 [inline] hardirqs last enabled at (14784905): [] d_walk+0x80f/0xc80 fs/dcache.c:1248 hardirqs last disabled at (14784906): [] interrupt_entry+0xb5/0xf0 arch/x86/entry/entry_64.S:625 softirqs last enabled at (8683328): [] __do_softirq+0x778/0xaf5 kernel/softirq.c:311 softirqs last disabled at (8683067): [] invoke_softirq kernel/softirq.c:365 [inline] softirqs last disabled at (8683067): [] irq_exit+0x1d1/0x200 kernel/softirq.c:405 CPU: 0 PID: 4479 Comm: syz-executor6 Not tainted 4.17.0-rc4+ #14 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:lock_acquire+0x99/0x520 kernel/locking/lockdep.c:3909 RSP: 0018:ffff8801a2d278d8 EFLAGS: 00000296 ORIG_RAX: ffffffffffffff13 RAX: ffffed00345a4f20 RBX: 1ffff100345a4f20 RCX: dffffc0000000000 RDX: ffff8801a2d1e680 RSI: 0000000000000001 RDI: ffff8801a2d1eeb4 RBP: ffff8801a2d279c8 R08: 0000000000000001 R09: 0000000000000000 R10: ffffed0039c260fc R11: ffff8801ce1307e3 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000000 FS: 0000000000b6f940(0000) GS:ffff8801dae00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000b78978 CR3: 00000001a2ce0000 CR4: 00000000001406f0 DR0: 0000000020000000 DR1: 00000000200001c0 DR2: 0000000020000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 Call Trace: _raw_spin_lock_nested+0x28/0x40 kernel/locking/spinlock.c:354 d_walk+0x3ad/0xc80 fs/dcache.c:1274 shrink_dcache_parent+0x179/0x230 fs/dcache.c:1486 vfs_rmdir+0x202/0x470 fs/namei.c:3850 do_rmdir+0x523/0x610 fs/namei.c:3911 __do_sys_rmdir fs/namei.c:3929 [inline] __se_sys_rmdir fs/namei.c:3927 [inline] __x64_sys_rmdir+0x36/0x40 fs/namei.c:3927 do_syscall_64+0x1b1/0x800 arch/x86/entry/common.c:287 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x455777 RSP: 002b:00007fffc4edf078 EFLAGS: 00000206 ORIG_RAX: 0000000000000054 RAX: ffffffffffffffda RBX: 0000000000000065 RCX: 0000000000455777 RDX: 0000000000000000 RSI: 00007fffc4ee0e20 RDI: 00007fffc4ee0e20 RBP: 00007fffc4ee0e20 R08: 0000000000000000 R09: 0000000000000001 R10: 000000000000000a R11: 0000000000000206 R12: 0000000000b70940 R13: 0000000000000000 R14: 0000000000000647 R15: 0000000000043532 Code: 0c 5d 81 89 b5 2c ff ff ff c7 00 f1 f1 f1 f1 c7 40 04 00 f2 f2 f2 c7 40 08 f2 f2 f2 f2 c7 40 0c 00 f2 f2 f2 c7 40 10 f3 f3 f3 f3 <48> 89 f8 48 c1 e8 03 0f b6 0c 08 48 89 f8 83 e0 07 83 c0 03 38 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 PID: 4476 Comm: syz-executor5 Not tainted 4.17.0-rc4+ #14 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:bytes_is_nonzero mm/kasan/kasan.c:167 [inline] RIP: 0010:memory_is_nonzero mm/kasan/kasan.c:184 [inline] RIP: 0010:memory_is_poisoned_n mm/kasan/kasan.c:210 [inline] RIP: 0010:memory_is_poisoned mm/kasan/kasan.c:241 [inline] RIP: 0010:check_memory_region_inline mm/kasan/kasan.c:257 [inline] RIP: 0010:check_memory_region+0x117/0x1b0 mm/kasan/kasan.c:267 RSP: 0018:ffff8801a56d74e8 EFLAGS: 00000046 RAX: fffffbfff1446fec RBX: 1ffffffff1446feb RCX: ffffffff815c9ec1 RDX: 0000000000000001 RSI: 0000000000000004 RDI: ffffffff8a237f58 RBP: ffff8801a56d7500 R08: fffffbfff1446fec R09: fffffbfff1446feb R10: fffffbfff1446feb R11: ffffffff8a237f5b R12: fffffbfff1446fec R13: 0000000000000000 R14: 0000000000000000 R15: ffff8801da501ab8 FS: 00000000021b7940(0000) GS:ffff8801daf00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00000000021c0978 CR3: 00000001a55d2000 CR4: 00000000001406e0 DR0: 00000000200001c0 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 Call Trace: kasan_check_write+0x14/0x20 mm/kasan/kasan.c:278 atomic_inc include/asm-generic/atomic-instrumented.h:102 [inline] __lock_acquire+0x291/0x5140 kernel/locking/lockdep.c:3323 lock_acquire+0x1dc/0x520 kernel/locking/lockdep.c:3920 __raw_spin_lock include/linux/spinlock_api_smp.h:142 [inline] _raw_spin_lock+0x2a/0x40 kernel/locking/spinlock.c:144 spin_lock include/linux/spinlock.h:310 [inline] d_walk+0x261/0xc80 fs/dcache.c:1250 shrink_dcache_parent+0x179/0x230 fs/dcache.c:1486 vfs_rmdir+0x202/0x470 fs/namei.c:3850 do_rmdir+0x523/0x610 fs/namei.c:3911 __do_sys_rmdir fs/namei.c:3929 [inline] __se_sys_rmdir fs/namei.c:3927 [inline] __x64_sys_rmdir+0x36/0x40 fs/namei.c:3927 do_syscall_64+0x1b1/0x800 arch/x86/entry/common.c:287 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x455777 RSP: 002b:00007ffd6e5c79a8 EFLAGS: 00000202 ORIG_RAX: 0000000000000054 RAX: ffffffffffffffda RBX: 0000000000000065 RCX: 0000000000455777 RDX: 0000000000000000 RSI: 00007ffd6e5c9750 RDI: 00007ffd6e5c9750 RBP: 00007ffd6e5c9750 R08: 0000000000000000 R09: 0000000000000001 R10: 000000000000000a R11: 0000000000000202 R12: 00000000021b8940 R13: 0000000000000000 R14: 000000000000063c R15: 000000000004351e Code: 0d 00 4d 85 c0 75 3e 4d 89 e0 49 29 c0 e9 6c ff ff ff 4d 85 c0 74 ba 48 b8 01 00 00 00 00 fc ff df 4d 01 c8 48 01 d8 41 80 39 00 <74> 08 e9 8c 00 00 00 48 89 d8 4c 39 c0 74 97 80 38 00 48 8d 58