rcu: INFO: rcu_preempt detected stalls on CPUs/tasks:
rcu: 1-...!: (1 GPs behind) idle=e55/1/0x4000000000000000 softirq=195796/195797 fqs=86
(detected by 0, t=10502 jiffies, g=279545, q=495 ncpus=2)
Sending NMI from CPU 0 to CPUs 1:
NMI backtrace for cpu 1
CPU: 1 PID: 2966 Comm: klogd Not tainted 5.19.0-rc3-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:__kasan_check_read+0x4/0x10 mm/kasan/shadow.c:31
Code: 0f 0b 48 83 c4 60 5b 5d 41 5c c3 48 05 00 80 00 00 48 89 fb 48 39 c7 0f 82 2b 0b 6d 07 eb e1 cc cc cc cc cc cc cc 48 8b 0c 24 <89> f6 31 d2 e9 b3 fa ff ff 0f 1f 00 48 8b 0c 24 89 f6 ba 01 00 00
RSP: 0018:ffffc900001f0b78 EFLAGS: 00000057
RAX: 0000000000000000 RBX: 0000000000000028 RCX: ffffffff815e013c
RDX: 0000000000000004 RSI: 0000000000000008 RDI: ffffffff9067e900
RBP: 0000000000000002 R08: 0000000000000000 R09: ffffffff9067e907
R10: 0000000000000000 R11: 0000000000000001 R12: ffff88807d932808
R13: ffff88807d931d80 R14: 0000000000000001 R15: 0000000000000040
FS: 00007faec0559800(0000) GS:ffff8880b9b00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f0a696d5400 CR3: 0000000022627000 CR4: 0000000000350ee0
Call Trace:
instrument_atomic_read include/linux/instrumented.h:71 [inline]
test_bit include/asm-generic/bitops/instrumented-non-atomic.h:134 [inline]
__lock_acquire+0x102c/0x5660 kernel/locking/lockdep.c:5023
lock_acquire kernel/locking/lockdep.c:5665 [inline]
lock_acquire+0x1ab/0x570 kernel/locking/lockdep.c:5630
rcu_lock_acquire include/linux/rcupdate.h:269 [inline]
rcu_read_lock include/linux/rcupdate.h:695 [inline]
advance_sched+0x4a5/0x9a0 net/sched/sch_taprio.c:768
__run_hrtimer kernel/time/hrtimer.c:1685 [inline]
__hrtimer_run_queues+0x609/0xe50 kernel/time/hrtimer.c:1749
hrtimer_interrupt+0x31c/0x790 kernel/time/hrtimer.c:1811
local_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1095 [inline]
__sysvec_apic_timer_interrupt+0x146/0x530 arch/x86/kernel/apic/apic.c:1112
sysvec_apic_timer_interrupt+0x8e/0xc0 arch/x86/kernel/apic/apic.c:1106
asm_sysvec_apic_timer_interrupt+0x1b/0x20 arch/x86/include/asm/idtentry.h:649
RIP: 0010:do_slab_free mm/slub.c:3448 [inline]
RIP: 0010:___cache_free+0xc4/0x400 mm/slub.c:3514
Code: 00 49 89 ef 48 89 ef e8 ea 53 ff ff 48 8b 00 f6 c4 02 74 12 4d 85 ff 74 0d 4c 8b 7d 38 4d 85 ff 0f 85 c4 00 00 00 49 8b 45 00 <65> 48 03 05 ac 13 3b 7e 48 8b 50 08 4c 39 60 10 0f 85 d9 02 00 00
RSP: 0018:ffffc90002d6f838 EFLAGS: 00000246
RAX: 0000000000040f50 RBX: ffff888048dc9100 RCX: 0000000000000000
RDX: 0000000000000000 RSI: ffffffff81364ca4 RDI: ffffea0001237200
RBP: ffffea0001237200 R08: 0000000000000007 R09: 0000000000000000
R10: 0000000000000000 R11: 1ffffd40002a5800 R12: ffffea0001237200
R13: ffff888140007500 R14: ffff888048dc9100 R15: 0000000000000000
qlink_free mm/kasan/quarantine.c:168 [inline]
qlist_free_all+0x6a/0x170 mm/kasan/quarantine.c:187
kasan_quarantine_reduce+0x180/0x200 mm/kasan/quarantine.c:294
__kasan_slab_alloc+0xa2/0xc0 mm/kasan/common.c:446
kasan_slab_alloc include/linux/kasan.h:224 [inline]
slab_post_alloc_hook mm/slab.h:750 [inline]
slab_alloc_node mm/slub.c:3214 [inline]
__kmalloc_node_track_caller+0x238/0x360 mm/slub.c:4950
kmalloc_reserve net/core/skbuff.c:354 [inline]
__alloc_skb+0xde/0x340 net/core/skbuff.c:426
alloc_skb include/linux/skbuff.h:1426 [inline]
alloc_skb_with_frags+0x93/0x730 net/core/skbuff.c:5992
sock_alloc_send_pskb+0x793/0x920 net/core/sock.c:2662
unix_dgram_sendmsg+0x425/0x1ad0 net/unix/af_unix.c:1895
sock_sendmsg_nosec net/socket.c:714 [inline]
sock_sendmsg+0xcf/0x120 net/socket.c:734
__sys_sendto+0x21a/0x320 net/socket.c:2119
__do_sys_sendto net/socket.c:2131 [inline]
__se_sys_sendto net/socket.c:2127 [inline]
__x64_sys_sendto+0xdd/0x1b0 net/socket.c:2127
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x46/0xb0
RIP: 0033:0x7faec06f50ac
Code: 89 02 48 c7 c0 ff ff ff ff eb b8 0f 1f 00 41 89 ca 64 8b 04 25 18 00 00 00 85 c0 75 19 45 31 c9 45 31 c0 b8 2c 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 64 c3 0f 1f 00 55 48 83 ec 20 48 89 54 24 10
RSP: 002b:00007ffd5b74b4c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002c
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007faec06f50ac
RDX: 000000000000004a RSI: 00005574a6c2c5c0 RDI: 0000000000000003
RBP: 00005574a6c22910 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000004000 R11: 0000000000000246 R12: 0000000000000014
R13: 0000000000000001 R14: 00007faec087077d R15: 00007ffd5b74b5d8
rcu: rcu_preempt kthread starved for 10329 jiffies! g279545 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=0
rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior.
rcu: RCU grace-period kthread stack dump:
task:rcu_preempt state:R running task stack:28456 pid: 17 ppid: 2 flags:0x00004000
Call Trace:
context_switch kernel/sched/core.c:5146 [inline]
__schedule+0xa00/0x4b50 kernel/sched/core.c:6458
schedule+0xd2/0x1f0 kernel/sched/core.c:6530
schedule_timeout+0x14a/0x2a0 kernel/time/timer.c:1935
rcu_gp_fqs_loop+0x186/0x810 kernel/rcu/tree.c:1999
rcu_gp_kthread+0x1de/0x320 kernel/rcu/tree.c:2187
kthread+0x2e9/0x3a0 kernel/kthread.c:376
ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:302
rcu: Stack dump where RCU GP kthread last ran:
NMI backtrace for cpu 0
CPU: 0 PID: 25834 Comm: syz-executor.1 Not tainted 5.19.0-rc3-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
nmi_cpu_backtrace.cold+0x47/0x144 lib/nmi_backtrace.c:111
nmi_trigger_cpumask_backtrace+0x1e6/0x230 lib/nmi_backtrace.c:62
trigger_single_cpu_backtrace include/linux/nmi.h:164 [inline]
rcu_check_gp_kthread_starvation.cold+0x1fb/0x200 kernel/rcu/tree_stall.h:518
print_other_cpu_stall kernel/rcu/tree_stall.h:623 [inline]
check_cpu_stall kernel/rcu/tree_stall.h:771 [inline]
rcu_pending kernel/rcu/tree.c:3977 [inline]
rcu_sched_clock_irq+0x2316/0x2370 kernel/rcu/tree.c:2675
update_process_times+0x11a/0x1a0 kernel/time/timer.c:1839
tick_sched_handle+0x9b/0x180 kernel/time/tick-sched.c:243
tick_sched_timer+0xee/0x120 kernel/time/tick-sched.c:1481
__run_hrtimer kernel/time/hrtimer.c:1685 [inline]
__hrtimer_run_queues+0x1c0/0xe50 kernel/time/hrtimer.c:1749
hrtimer_interrupt+0x31c/0x790 kernel/time/hrtimer.c:1811
local_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1095 [inline]
__sysvec_apic_timer_interrupt+0x146/0x530 arch/x86/kernel/apic/apic.c:1112
sysvec_apic_timer_interrupt+0x8e/0xc0 arch/x86/kernel/apic/apic.c:1106
asm_sysvec_apic_timer_interrupt+0x1b/0x20 arch/x86/include/asm/idtentry.h:649
RIP: 0010:csd_lock_wait kernel/smp.c:414 [inline]
RIP: 0010:smp_call_function_many_cond+0x499/0x1110 kernel/smp.c:988
Code: 01 89 ee e8 19 94 0a 00 85 ed 74 47 48 8b 04 24 49 89 c4 83 e0 07 49 c1 ec 03 48 89 c5 4d 01 fc 83 c5 03 e8 b9 97 0a 00 f3 90 <41> 0f b6 04 24 40 38 c5 7c 08 84 c0 0f 85 21 0a 00 00 8b 43 08 31
RSP: 0018:ffffc900069d7948 EFLAGS: 00000293
RAX: 0000000000000000 RBX: ffff8880b9b401e0 RCX: 0000000000000000
RDX: ffff888020808000 RSI: ffffffff816fddc7 RDI: 0000000000000005
RBP: 0000000000000003 R08: 0000000000000005 R09: 0000000000000000
R10: 0000000000000001 R11: 0000000000000001 R12: ffffed101736803d
R13: 0000000000000001 R14: 0000000000000001 R15: dffffc0000000000
on_each_cpu_cond_mask+0x56/0xa0 kernel/smp.c:1154
on_each_cpu include/linux/smp.h:71 [inline]
text_poke_sync arch/x86/kernel/alternative.c:1231 [inline]
text_poke_bp_batch+0x233/0x6c0 arch/x86/kernel/alternative.c:1419
text_poke_bp+0xad/0x110 arch/x86/kernel/alternative.c:1635
arch_static_call_transform+0x4d/0x90 arch/x86/kernel/static_call.c:107
__static_call_update+0xcf/0x620 kernel/static_call_inline.c:136
tracepoint_update_call kernel/tracepoint.c:317 [inline]
tracepoint_remove_func kernel/tracepoint.c:441 [inline]
tracepoint_probe_unregister+0x9d0/0xc30 kernel/tracepoint.c:551
bpf_raw_tp_link_release+0x51/0xa0 kernel/bpf/syscall.c:3110
bpf_link_free+0xe6/0x1b0 kernel/bpf/syscall.c:2693
bpf_link_put+0x161/0x1b0 kernel/bpf/syscall.c:2719
bpf_link_release+0x33/0x40 kernel/bpf/syscall.c:2728
__fput+0x277/0x9d0 fs/file_table.c:317
task_work_run+0xdd/0x1a0 kernel/task_work.c:177
resume_user_mode_work include/linux/resume_user_mode.h:49 [inline]
exit_to_user_mode_loop kernel/entry/common.c:169 [inline]
exit_to_user_mode_prepare+0x23c/0x250 kernel/entry/common.c:201
__syscall_exit_to_user_mode_work kernel/entry/common.c:283 [inline]
syscall_exit_to_user_mode+0x19/0x50 kernel/entry/common.c:294
do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86
entry_SYSCALL_64_after_hwframe+0x46/0xb0
RIP: 0033:0x7f340c03bd4b
================================
WARNING: inconsistent lock state
5.19.0-rc3-syzkaller #0 Not tainted
--------------------------------
inconsistent {HARDIRQ-ON-W} -> {IN-HARDIRQ-W} usage.
syz-executor.1/25834 [HC1[1]:SC0[0]:HE0:SE1] takes:
ffffffff8beb88d8 (vmap_area_lock){?.+.}-{2:2}, at: spin_lock include/linux/spinlock.h:349 [inline]
ffffffff8beb88d8 (vmap_area_lock){?.+.}-{2:2}, at: find_vmap_area+0x1c/0x130 mm/vmalloc.c:1805
{HARDIRQ-ON-W} state was registered at:
lock_acquire kernel/locking/lockdep.c:5665 [inline]
lock_acquire+0x1ab/0x570 kernel/locking/lockdep.c:5630
__raw_spin_lock include/linux/spinlock_api_smp.h:133 [inline]
_raw_spin_lock+0x2a/0x40 kernel/locking/spinlock.c:154
spin_lock include/linux/spinlock.h:349 [inline]
alloc_vmap_area+0xa49/0x1f00 mm/vmalloc.c:1586
__get_vm_area_node+0x142/0x3f0 mm/vmalloc.c:2453
get_vm_area_caller+0x43/0x50 mm/vmalloc.c:2506
__ioremap_caller.constprop.0+0x292/0x600 arch/x86/mm/ioremap.c:280
acpi_os_ioremap include/acpi/acpi_io.h:13 [inline]
acpi_map drivers/acpi/osl.c:296 [inline]
acpi_os_map_iomem+0x463/0x550 drivers/acpi/osl.c:355
acpi_tb_acquire_table+0xd8/0x209 drivers/acpi/acpica/tbdata.c:142
acpi_tb_validate_table drivers/acpi/acpica/tbdata.c:317 [inline]
acpi_tb_validate_table+0x50/0x8c drivers/acpi/acpica/tbdata.c:308
acpi_tb_verify_temp_table+0x84/0x674 drivers/acpi/acpica/tbdata.c:504
acpi_reallocate_root_table+0x374/0x3e0 drivers/acpi/acpica/tbxface.c:180
acpi_early_init+0x13a/0x438 drivers/acpi/bus.c:1200
start_kernel+0x3cf/0x48f init/main.c:1098
secondary_startup_64_no_verify+0xce/0xdb
irq event stamp: 26172
hardirqs last enabled at (26171): [] asm_sysvec_apic_timer_interrupt+0x1b/0x20 arch/x86/include/asm/idtentry.h:649
hardirqs last disabled at (26172): [] sysvec_apic_timer_interrupt+0xb/0xc0 arch/x86/kernel/apic/apic.c:1106
softirqs last enabled at (5506): [] invoke_softirq kernel/softirq.c:445 [inline]
softirqs last enabled at (5506): [] __irq_exit_rcu+0x123/0x180 kernel/softirq.c:650
softirqs last disabled at (5459): [] invoke_softirq kernel/softirq.c:445 [inline]
softirqs last disabled at (5459): [] __irq_exit_rcu+0x123/0x180 kernel/softirq.c:650
other info that might help us debug this:
Possible unsafe locking scenario:
CPU0
----
lock(vmap_area_lock);
lock(vmap_area_lock);
*** DEADLOCK ***
4 locks held by syz-executor.1/25834:
#0: ffffffff8bdeefa8 (tracepoints_mutex){+.+.}-{3:3}, at: tracepoint_probe_unregister+0x2d/0xc30 kernel/tracepoint.c:548
#1: ffffffff8bc34170 (cpu_hotplug_lock){++++}-{0:0}, at: __static_call_update+0x87/0x620 kernel/static_call_inline.c:128
#2: ffffffff8be5cd88 (static_call_mutex){+.+.}-{3:3}, at: static_call_lock kernel/static_call_inline.c:25 [inline]
#2: ffffffff8be5cd88 (static_call_mutex){+.+.}-{3:3}, at: __static_call_update+0x95/0x620 kernel/static_call_inline.c:129
#3: ffffffff8bc4f388 (text_mutex){+.+.}-{3:3}, at: arch_static_call_transform+0x1f/0x90 arch/x86/kernel/static_call.c:103
stack backtrace:
CPU: 0 PID: 25834 Comm: syz-executor.1 Not tainted 5.19.0-rc3-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
print_usage_bug kernel/locking/lockdep.c:3961 [inline]
valid_state kernel/locking/lockdep.c:3973 [inline]
mark_lock_irq kernel/locking/lockdep.c:4176 [inline]
mark_lock.part.0.cold+0x18/0xd8 kernel/locking/lockdep.c:4632
mark_lock kernel/locking/lockdep.c:4596 [inline]
mark_usage kernel/locking/lockdep.c:4524 [inline]
__lock_acquire+0x14ad/0x5660 kernel/locking/lockdep.c:5007
lock_acquire kernel/locking/lockdep.c:5665 [inline]
lock_acquire+0x1ab/0x570 kernel/locking/lockdep.c:5630
__raw_spin_lock include/linux/spinlock_api_smp.h:133 [inline]
_raw_spin_lock+0x2a/0x40 kernel/locking/spinlock.c:154
spin_lock include/linux/spinlock.h:349 [inline]
find_vmap_area+0x1c/0x130 mm/vmalloc.c:1805
check_heap_object mm/usercopy.c:176 [inline]
__check_object_size mm/usercopy.c:250 [inline]
__check_object_size+0x1f8/0x700 mm/usercopy.c:212
check_object_size include/linux/thread_info.h:199 [inline]
__copy_from_user_inatomic include/linux/uaccess.h:62 [inline]
copy_from_user_nmi arch/x86/lib/usercopy.c:47 [inline]
copy_from_user_nmi+0xcb/0x130 arch/x86/lib/usercopy.c:31
copy_code arch/x86/kernel/dumpstack.c:91 [inline]
show_opcodes+0x59/0xb0 arch/x86/kernel/dumpstack.c:121
show_iret_regs+0xd/0x33 arch/x86/kernel/dumpstack.c:149
__show_regs+0x1e/0x60 arch/x86/kernel/process_64.c:74
show_trace_log_lvl+0x25b/0x2ba arch/x86/kernel/dumpstack.c:292
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
nmi_cpu_backtrace.cold+0x47/0x144 lib/nmi_backtrace.c:111
nmi_trigger_cpumask_backtrace+0x1e6/0x230 lib/nmi_backtrace.c:62
trigger_single_cpu_backtrace include/linux/nmi.h:164 [inline]
rcu_check_gp_kthread_starvation.cold+0x1fb/0x200 kernel/rcu/tree_stall.h:518
print_other_cpu_stall kernel/rcu/tree_stall.h:623 [inline]
check_cpu_stall kernel/rcu/tree_stall.h:771 [inline]
rcu_pending kernel/rcu/tree.c:3977 [inline]
rcu_sched_clock_irq+0x2316/0x2370 kernel/rcu/tree.c:2675
update_process_times+0x11a/0x1a0 kernel/time/timer.c:1839
tick_sched_handle+0x9b/0x180 kernel/time/tick-sched.c:243
tick_sched_timer+0xee/0x120 kernel/time/tick-sched.c:1481
__run_hrtimer kernel/time/hrtimer.c:1685 [inline]
__hrtimer_run_queues+0x1c0/0xe50 kernel/time/hrtimer.c:1749
hrtimer_interrupt+0x31c/0x790 kernel/time/hrtimer.c:1811
local_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1095 [inline]
__sysvec_apic_timer_interrupt+0x146/0x530 arch/x86/kernel/apic/apic.c:1112
sysvec_apic_timer_interrupt+0x8e/0xc0 arch/x86/kernel/apic/apic.c:1106
asm_sysvec_apic_timer_interrupt+0x1b/0x20 arch/x86/include/asm/idtentry.h:649
RIP: 0010:csd_lock_wait kernel/smp.c:414 [inline]
RIP: 0010:smp_call_function_many_cond+0x499/0x1110 kernel/smp.c:988
Code: 01 89 ee e8 19 94 0a 00 85 ed 74 47 48 8b 04 24 49 89 c4 83 e0 07 49 c1 ec 03 48 89 c5 4d 01 fc 83 c5 03 e8 b9 97 0a 00 f3 90 <41> 0f b6 04 24 40 38 c5 7c 08 84 c0 0f 85 21 0a 00 00 8b 43 08 31
RSP: 0018:ffffc900069d7948 EFLAGS: 00000293
RAX: 0000000000000000 RBX: ffff8880b9b401e0 RCX: 0000000000000000
RDX: ffff888020808000 RSI: ffffffff816fddc7 RDI: 0000000000000005
RBP: 0000000000000003 R08: 0000000000000005 R09: 0000000000000000
R10: 0000000000000001 R11: 0000000000000001 R12: ffffed101736803d
R13: 0000000000000001 R14: 0000000000000001 R15: dffffc0000000000
on_each_cpu_cond_mask+0x56/0xa0 kernel/smp.c:1154
on_each_cpu include/linux/smp.h:71 [inline]
text_poke_sync arch/x86/kernel/alternative.c:1231 [inline]
text_poke_bp_batch+0x233/0x6c0 arch/x86/kernel/alternative.c:1419
text_poke_bp+0xad/0x110 arch/x86/kernel/alternative.c:1635
arch_static_call_transform+0x4d/0x90 arch/x86/kernel/static_call.c:107
__static_call_update+0xcf/0x620 kernel/static_call_inline.c:136
tracepoint_update_call kernel/tracepoint.c:317 [inline]
tracepoint_remove_func kernel/tracepoint.c:441 [inline]
tracepoint_probe_unregister+0x9d0/0xc30 kernel/tracepoint.c:551
bpf_raw_tp_link_release+0x51/0xa0 kernel/bpf/syscall.c:3110
bpf_link_free+0xe6/0x1b0 kernel/bpf/syscall.c:2693
bpf_link_put+0x161/0x1b0 kernel/bpf/syscall.c:2719
bpf_link_release+0x33/0x40 kernel/bpf/syscall.c:2728
__fput+0x277/0x9d0 fs/file_table.c:317
task_work_run+0xdd/0x1a0 kernel/task_work.c:177
resume_user_mode_work include/linux/resume_user_mode.h:49 [inline]
exit_to_user_mode_loop kernel/entry/common.c:169 [inline]
exit_to_user_mode_prepare+0x23c/0x250 kernel/entry/common.c:201
__syscall_exit_to_user_mode_work kernel/entry/common.c:283 [inline]
syscall_exit_to_user_mode+0x19/0x50 kernel/entry/common.c:294
do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86
entry_SYSCALL_64_after_hwframe+0x46/0xb0
RIP: 0033:0x7f340c03bd4b
Code: 0f 05 48 3d 00 f0 ff ff 77 45 c3 0f 1f 40 00 48 83 ec 18 89 7c 24 0c e8 63 fc ff ff 8b 7c 24 0c 41 89 c0 b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 35 44 89 c7 89 44 24 0c e8 a1 fc ff ff 8b 44
RSP: 002b:00007ffe5f7eb9d0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003
RAX: 0000000000000000 RBX: 0000000000000005 RCX: 00007f340c03bd4b
RDX: 0000001b33820000 RSI: 00007f340be01058 RDI: 0000000000000004
RBP: 00007f340c19d960 R08: 0000000000000000 R09: 00000000d1add44d
R10: 00007ffe5f7f0090 R11: 0000000000000293 R12: 0000000000272f67
R13: 00007ffe5f7ebad0 R14: 00007f340c19c100 R15: 0000000000000032
Code: 0f 05 48 3d 00 f0 ff ff 77 45 c3 0f 1f 40 00 48 83 ec 18 89 7c 24 0c e8 63 fc ff ff 8b 7c 24 0c 41 89 c0 b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 35 44 89 c7 89 44 24 0c e8 a1 fc ff ff 8b 44
RSP: 002b:00007ffe5f7eb9d0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003
RAX: 0000000000000000 RBX: 0000000000000005 RCX: 00007f340c03bd4b
RDX: 0000001b33820000 RSI: 00007f340be01058 RDI: 0000000000000004
RBP: 00007f340c19d960 R08: 0000000000000000 R09: 00000000d1add44d
R10: 00007ffe5f7f0090 R11: 0000000000000293 R12: 0000000000272f67
R13: 00007ffe5f7ebad0 R14: 00007f340c19c100 R15: 0000000000000032
watchdog: BUG: soft lockup - CPU#0 stuck for 246s! [syz-executor.1:25834]
Modules linked in:
irq event stamp: 26172
hardirqs last enabled at (26171): [] asm_sysvec_apic_timer_interrupt+0x1b/0x20 arch/x86/include/asm/idtentry.h:649
hardirqs last disabled at (26172): [] sysvec_apic_timer_interrupt+0xb/0xc0 arch/x86/kernel/apic/apic.c:1106
softirqs last enabled at (5506): [] invoke_softirq kernel/softirq.c:445 [inline]
softirqs last enabled at (5506): [] __irq_exit_rcu+0x123/0x180 kernel/softirq.c:650
softirqs last disabled at (5459): [] invoke_softirq kernel/softirq.c:445 [inline]
softirqs last disabled at (5459): [] __irq_exit_rcu+0x123/0x180 kernel/softirq.c:650
CPU: 0 PID: 25834 Comm: syz-executor.1 Not tainted 5.19.0-rc3-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:csd_lock_wait kernel/smp.c:414 [inline]
RIP: 0010:smp_call_function_many_cond+0x499/0x1110 kernel/smp.c:988
Code: 01 89 ee e8 19 94 0a 00 85 ed 74 47 48 8b 04 24 49 89 c4 83 e0 07 49 c1 ec 03 48 89 c5 4d 01 fc 83 c5 03 e8 b9 97 0a 00 f3 90 <41> 0f b6 04 24 40 38 c5 7c 08 84 c0 0f 85 21 0a 00 00 8b 43 08 31
RSP: 0018:ffffc900069d7948 EFLAGS: 00000293
RAX: 0000000000000000 RBX: ffff8880b9b401e0 RCX: 0000000000000000
RDX: ffff888020808000 RSI: ffffffff816fddc7 RDI: 0000000000000005
RBP: 0000000000000003 R08: 0000000000000005 R09: 0000000000000000
R10: 0000000000000001 R11: 0000000000000001 R12: ffffed101736803d
R13: 0000000000000001 R14: 0000000000000001 R15: dffffc0000000000
FS: 000055555660c400(0000) GS:ffff8880b9a00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f18f5b6c058 CR3: 0000000055336000 CR4: 0000000000350ef0
Call Trace:
on_each_cpu_cond_mask+0x56/0xa0 kernel/smp.c:1154
on_each_cpu include/linux/smp.h:71 [inline]
text_poke_sync arch/x86/kernel/alternative.c:1231 [inline]
text_poke_bp_batch+0x233/0x6c0 arch/x86/kernel/alternative.c:1419
text_poke_bp+0xad/0x110 arch/x86/kernel/alternative.c:1635
arch_static_call_transform+0x4d/0x90 arch/x86/kernel/static_call.c:107
__static_call_update+0xcf/0x620 kernel/static_call_inline.c:136
tracepoint_update_call kernel/tracepoint.c:317 [inline]
tracepoint_remove_func kernel/tracepoint.c:441 [inline]
tracepoint_probe_unregister+0x9d0/0xc30 kernel/tracepoint.c:551
bpf_raw_tp_link_release+0x51/0xa0 kernel/bpf/syscall.c:3110
bpf_link_free+0xe6/0x1b0 kernel/bpf/syscall.c:2693
bpf_link_put+0x161/0x1b0 kernel/bpf/syscall.c:2719
bpf_link_release+0x33/0x40 kernel/bpf/syscall.c:2728
__fput+0x277/0x9d0 fs/file_table.c:317
task_work_run+0xdd/0x1a0 kernel/task_work.c:177
resume_user_mode_work include/linux/resume_user_mode.h:49 [inline]
exit_to_user_mode_loop kernel/entry/common.c:169 [inline]
exit_to_user_mode_prepare+0x23c/0x250 kernel/entry/common.c:201
__syscall_exit_to_user_mode_work kernel/entry/common.c:283 [inline]
syscall_exit_to_user_mode+0x19/0x50 kernel/entry/common.c:294
do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86
entry_SYSCALL_64_after_hwframe+0x46/0xb0
RIP: 0033:0x7f340c03bd4b
Code: 0f 05 48 3d 00 f0 ff ff 77 45 c3 0f 1f 40 00 48 83 ec 18 89 7c 24 0c e8 63 fc ff ff 8b 7c 24 0c 41 89 c0 b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 35 44 89 c7 89 44 24 0c e8 a1 fc ff ff 8b 44
RSP: 002b:00007ffe5f7eb9d0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003
RAX: 0000000000000000 RBX: 0000000000000005 RCX: 00007f340c03bd4b
RDX: 0000001b33820000 RSI: 00007f340be01058 RDI: 0000000000000004
RBP: 00007f340c19d960 R08: 0000000000000000 R09: 00000000d1add44d
R10: 00007ffe5f7f0090 R11: 0000000000000293 R12: 0000000000272f67
R13: 00007ffe5f7ebad0 R14: 00007f340c19c100 R15: 0000000000000032
Sending NMI from CPU 0 to CPUs 1:
NMI backtrace for cpu 1
CPU: 1 PID: 2966 Comm: klogd Not tainted 5.19.0-rc3-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:__sanitizer_cov_trace_const_cmp1+0x4/0x20 kernel/kcov.c:283
Code: 00 00 00 0f 1f 00 48 8b 0c 24 48 89 f2 48 89 fe bf 06 00 00 00 e9 fc fe ff ff 66 66 2e 0f 1f 84 00 00 00 00 00 90 48 8b 0c 24 <40> 0f b6 d6 40 0f b6 f7 bf 01 00 00 00 e9 da fe ff ff 66 2e 0f 1f
RSP: 0018:ffffc900001f0e38 EFLAGS: 00000046
RAX: 0000000000000001 RBX: ffff88807a4a9b40 RCX: ffffffff816ab65d
RDX: fffffbfff1b770a3 RSI: 0000000000000001 RDI: 0000000000000000
RBP: 0000000000000001 R08: 0000000000000000 R09: ffffffff8dbb8517
R10: fffffbfff1b770a2 R11: 0000000000000001 R12: 0000000000000001
R13: ffff8880b9b2a600 R14: ffff8880b9b2a500 R15: 0000000000000001
FS: 00007faec0559800(0000) GS:ffff8880b9b00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f0a696d5400 CR3: 0000000022627000 CR4: 0000000000350ee0
Call Trace:
trace_hrtimer_expire_exit include/trace/events/timer.h:282 [inline]
__run_hrtimer kernel/time/hrtimer.c:1688 [inline]
__hrtimer_run_queues+0x22d/0xe50 kernel/time/hrtimer.c:1749
hrtimer_interrupt+0x31c/0x790 kernel/time/hrtimer.c:1811
local_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1095 [inline]
__sysvec_apic_timer_interrupt+0x146/0x530 arch/x86/kernel/apic/apic.c:1112
sysvec_apic_timer_interrupt+0x8e/0xc0 arch/x86/kernel/apic/apic.c:1106
asm_sysvec_apic_timer_interrupt+0x1b/0x20 arch/x86/include/asm/idtentry.h:649
RIP: 0010:do_slab_free mm/slub.c:3448 [inline]
RIP: 0010:___cache_free+0xc4/0x400 mm/slub.c:3514
Code: 00 49 89 ef 48 89 ef e8 ea 53 ff ff 48 8b 00 f6 c4 02 74 12 4d 85 ff 74 0d 4c 8b 7d 38 4d 85 ff 0f 85 c4 00 00 00 49 8b 45 00 <65> 48 03 05 ac 13 3b 7e 48 8b 50 08 4c 39 60 10 0f 85 d9 02 00 00
RSP: 0018:ffffc90002d6f838 EFLAGS: 00000246
RAX: 0000000000040f50 RBX: ffff888048dc9100 RCX: 0000000000000000
RDX: 0000000000000000 RSI: ffffffff81364ca4 RDI: ffffea0001237200
RBP: ffffea0001237200 R08: 0000000000000007 R09: 0000000000000000
R10: 0000000000000000 R11: 1ffffd40002a5800 R12: ffffea0001237200
R13: ffff888140007500 R14: ffff888048dc9100 R15: 0000000000000000
qlink_free mm/kasan/quarantine.c:168 [inline]
qlist_free_all+0x6a/0x170 mm/kasan/quarantine.c:187
kasan_quarantine_reduce+0x180/0x200 mm/kasan/quarantine.c:294
__kasan_slab_alloc+0xa2/0xc0 mm/kasan/common.c:446
kasan_slab_alloc include/linux/kasan.h:224 [inline]
slab_post_alloc_hook mm/slab.h:750 [inline]
slab_alloc_node mm/slub.c:3214 [inline]
__kmalloc_node_track_caller+0x238/0x360 mm/slub.c:4950
kmalloc_reserve net/core/skbuff.c:354 [inline]
__alloc_skb+0xde/0x340 net/core/skbuff.c:426
alloc_skb include/linux/skbuff.h:1426 [inline]
alloc_skb_with_frags+0x93/0x730 net/core/skbuff.c:5992
sock_alloc_send_pskb+0x793/0x920 net/core/sock.c:2662
unix_dgram_sendmsg+0x425/0x1ad0 net/unix/af_unix.c:1895
sock_sendmsg_nosec net/socket.c:714 [inline]
sock_sendmsg+0xcf/0x120 net/socket.c:734
__sys_sendto+0x21a/0x320 net/socket.c:2119
__do_sys_sendto net/socket.c:2131 [inline]
__se_sys_sendto net/socket.c:2127 [inline]
__x64_sys_sendto+0xdd/0x1b0 net/socket.c:2127
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x46/0xb0
RIP: 0033:0x7faec06f50ac
Code: 89 02 48 c7 c0 ff ff ff ff eb b8 0f 1f 00 41 89 ca 64 8b 04 25 18 00 00 00 85 c0 75 19 45 31 c9 45 31 c0 b8 2c 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 64 c3 0f 1f 00 55 48 83 ec 20 48 89 54 24 10
RSP: 002b:00007ffd5b74b4c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002c
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007faec06f50ac
RDX: 000000000000004a RSI: 00005574a6c2c5c0 RDI: 0000000000000003
RBP: 00005574a6c22910 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000004000 R11: 0000000000000246 R12: 0000000000000014
R13: 0000000000000001 R14: 00007faec087077d R15: 00007ffd5b74b5d8
----------------
Code disassembly (best guess):
0: 0f 0b ud2
2: 48 83 c4 60 add $0x60,%rsp
6: 5b pop %rbx
7: 5d pop %rbp
8: 41 5c pop %r12
a: c3 retq
b: 48 05 00 80 00 00 add $0x8000,%rax
11: 48 89 fb mov %rdi,%rbx
14: 48 39 c7 cmp %rax,%rdi
17: 0f 82 2b 0b 6d 07 jb 0x76d0b48
1d: eb e1 jmp 0x0
1f: cc int3
20: cc int3
21: cc int3
22: cc int3
23: cc int3
24: cc int3
25: cc int3
26: 48 8b 0c 24 mov (%rsp),%rcx
* 2a: 89 f6 mov %esi,%esi <-- trapping instruction
2c: 31 d2 xor %edx,%edx
2e: e9 b3 fa ff ff jmpq 0xfffffae6
33: 0f 1f 00 nopl (%rax)
36: 48 8b 0c 24 mov (%rsp),%rcx
3a: 89 f6 mov %esi,%esi
3c: ba .byte 0xba
3d: 01 00 add %eax,(%rax)