rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: rcu: 1-...!: (1 GPs behind) idle=e55/1/0x4000000000000000 softirq=195796/195797 fqs=86 (detected by 0, t=10502 jiffies, g=279545, q=495 ncpus=2) Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 PID: 2966 Comm: klogd Not tainted 5.19.0-rc3-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:__kasan_check_read+0x4/0x10 mm/kasan/shadow.c:31 Code: 0f 0b 48 83 c4 60 5b 5d 41 5c c3 48 05 00 80 00 00 48 89 fb 48 39 c7 0f 82 2b 0b 6d 07 eb e1 cc cc cc cc cc cc cc 48 8b 0c 24 <89> f6 31 d2 e9 b3 fa ff ff 0f 1f 00 48 8b 0c 24 89 f6 ba 01 00 00 RSP: 0018:ffffc900001f0b78 EFLAGS: 00000057 RAX: 0000000000000000 RBX: 0000000000000028 RCX: ffffffff815e013c RDX: 0000000000000004 RSI: 0000000000000008 RDI: ffffffff9067e900 RBP: 0000000000000002 R08: 0000000000000000 R09: ffffffff9067e907 R10: 0000000000000000 R11: 0000000000000001 R12: ffff88807d932808 R13: ffff88807d931d80 R14: 0000000000000001 R15: 0000000000000040 FS: 00007faec0559800(0000) GS:ffff8880b9b00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f0a696d5400 CR3: 0000000022627000 CR4: 0000000000350ee0 Call Trace: instrument_atomic_read include/linux/instrumented.h:71 [inline] test_bit include/asm-generic/bitops/instrumented-non-atomic.h:134 [inline] __lock_acquire+0x102c/0x5660 kernel/locking/lockdep.c:5023 lock_acquire kernel/locking/lockdep.c:5665 [inline] lock_acquire+0x1ab/0x570 kernel/locking/lockdep.c:5630 rcu_lock_acquire include/linux/rcupdate.h:269 [inline] rcu_read_lock include/linux/rcupdate.h:695 [inline] advance_sched+0x4a5/0x9a0 net/sched/sch_taprio.c:768 __run_hrtimer kernel/time/hrtimer.c:1685 [inline] __hrtimer_run_queues+0x609/0xe50 kernel/time/hrtimer.c:1749 hrtimer_interrupt+0x31c/0x790 kernel/time/hrtimer.c:1811 local_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1095 [inline] __sysvec_apic_timer_interrupt+0x146/0x530 arch/x86/kernel/apic/apic.c:1112 sysvec_apic_timer_interrupt+0x8e/0xc0 arch/x86/kernel/apic/apic.c:1106 asm_sysvec_apic_timer_interrupt+0x1b/0x20 arch/x86/include/asm/idtentry.h:649 RIP: 0010:do_slab_free mm/slub.c:3448 [inline] RIP: 0010:___cache_free+0xc4/0x400 mm/slub.c:3514 Code: 00 49 89 ef 48 89 ef e8 ea 53 ff ff 48 8b 00 f6 c4 02 74 12 4d 85 ff 74 0d 4c 8b 7d 38 4d 85 ff 0f 85 c4 00 00 00 49 8b 45 00 <65> 48 03 05 ac 13 3b 7e 48 8b 50 08 4c 39 60 10 0f 85 d9 02 00 00 RSP: 0018:ffffc90002d6f838 EFLAGS: 00000246 RAX: 0000000000040f50 RBX: ffff888048dc9100 RCX: 0000000000000000 RDX: 0000000000000000 RSI: ffffffff81364ca4 RDI: ffffea0001237200 RBP: ffffea0001237200 R08: 0000000000000007 R09: 0000000000000000 R10: 0000000000000000 R11: 1ffffd40002a5800 R12: ffffea0001237200 R13: ffff888140007500 R14: ffff888048dc9100 R15: 0000000000000000 qlink_free mm/kasan/quarantine.c:168 [inline] qlist_free_all+0x6a/0x170 mm/kasan/quarantine.c:187 kasan_quarantine_reduce+0x180/0x200 mm/kasan/quarantine.c:294 __kasan_slab_alloc+0xa2/0xc0 mm/kasan/common.c:446 kasan_slab_alloc include/linux/kasan.h:224 [inline] slab_post_alloc_hook mm/slab.h:750 [inline] slab_alloc_node mm/slub.c:3214 [inline] __kmalloc_node_track_caller+0x238/0x360 mm/slub.c:4950 kmalloc_reserve net/core/skbuff.c:354 [inline] __alloc_skb+0xde/0x340 net/core/skbuff.c:426 alloc_skb include/linux/skbuff.h:1426 [inline] alloc_skb_with_frags+0x93/0x730 net/core/skbuff.c:5992 sock_alloc_send_pskb+0x793/0x920 net/core/sock.c:2662 unix_dgram_sendmsg+0x425/0x1ad0 net/unix/af_unix.c:1895 sock_sendmsg_nosec net/socket.c:714 [inline] sock_sendmsg+0xcf/0x120 net/socket.c:734 __sys_sendto+0x21a/0x320 net/socket.c:2119 __do_sys_sendto net/socket.c:2131 [inline] __se_sys_sendto net/socket.c:2127 [inline] __x64_sys_sendto+0xdd/0x1b0 net/socket.c:2127 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x46/0xb0 RIP: 0033:0x7faec06f50ac Code: 89 02 48 c7 c0 ff ff ff ff eb b8 0f 1f 00 41 89 ca 64 8b 04 25 18 00 00 00 85 c0 75 19 45 31 c9 45 31 c0 b8 2c 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 64 c3 0f 1f 00 55 48 83 ec 20 48 89 54 24 10 RSP: 002b:00007ffd5b74b4c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002c RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007faec06f50ac RDX: 000000000000004a RSI: 00005574a6c2c5c0 RDI: 0000000000000003 RBP: 00005574a6c22910 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000004000 R11: 0000000000000246 R12: 0000000000000014 R13: 0000000000000001 R14: 00007faec087077d R15: 00007ffd5b74b5d8 rcu: rcu_preempt kthread starved for 10329 jiffies! g279545 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=0 rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. rcu: RCU grace-period kthread stack dump: task:rcu_preempt state:R running task stack:28456 pid: 17 ppid: 2 flags:0x00004000 Call Trace: context_switch kernel/sched/core.c:5146 [inline] __schedule+0xa00/0x4b50 kernel/sched/core.c:6458 schedule+0xd2/0x1f0 kernel/sched/core.c:6530 schedule_timeout+0x14a/0x2a0 kernel/time/timer.c:1935 rcu_gp_fqs_loop+0x186/0x810 kernel/rcu/tree.c:1999 rcu_gp_kthread+0x1de/0x320 kernel/rcu/tree.c:2187 kthread+0x2e9/0x3a0 kernel/kthread.c:376 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:302 rcu: Stack dump where RCU GP kthread last ran: NMI backtrace for cpu 0 CPU: 0 PID: 25834 Comm: syz-executor.1 Not tainted 5.19.0-rc3-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106 nmi_cpu_backtrace.cold+0x47/0x144 lib/nmi_backtrace.c:111 nmi_trigger_cpumask_backtrace+0x1e6/0x230 lib/nmi_backtrace.c:62 trigger_single_cpu_backtrace include/linux/nmi.h:164 [inline] rcu_check_gp_kthread_starvation.cold+0x1fb/0x200 kernel/rcu/tree_stall.h:518 print_other_cpu_stall kernel/rcu/tree_stall.h:623 [inline] check_cpu_stall kernel/rcu/tree_stall.h:771 [inline] rcu_pending kernel/rcu/tree.c:3977 [inline] rcu_sched_clock_irq+0x2316/0x2370 kernel/rcu/tree.c:2675 update_process_times+0x11a/0x1a0 kernel/time/timer.c:1839 tick_sched_handle+0x9b/0x180 kernel/time/tick-sched.c:243 tick_sched_timer+0xee/0x120 kernel/time/tick-sched.c:1481 __run_hrtimer kernel/time/hrtimer.c:1685 [inline] __hrtimer_run_queues+0x1c0/0xe50 kernel/time/hrtimer.c:1749 hrtimer_interrupt+0x31c/0x790 kernel/time/hrtimer.c:1811 local_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1095 [inline] __sysvec_apic_timer_interrupt+0x146/0x530 arch/x86/kernel/apic/apic.c:1112 sysvec_apic_timer_interrupt+0x8e/0xc0 arch/x86/kernel/apic/apic.c:1106 asm_sysvec_apic_timer_interrupt+0x1b/0x20 arch/x86/include/asm/idtentry.h:649 RIP: 0010:csd_lock_wait kernel/smp.c:414 [inline] RIP: 0010:smp_call_function_many_cond+0x499/0x1110 kernel/smp.c:988 Code: 01 89 ee e8 19 94 0a 00 85 ed 74 47 48 8b 04 24 49 89 c4 83 e0 07 49 c1 ec 03 48 89 c5 4d 01 fc 83 c5 03 e8 b9 97 0a 00 f3 90 <41> 0f b6 04 24 40 38 c5 7c 08 84 c0 0f 85 21 0a 00 00 8b 43 08 31 RSP: 0018:ffffc900069d7948 EFLAGS: 00000293 RAX: 0000000000000000 RBX: ffff8880b9b401e0 RCX: 0000000000000000 RDX: ffff888020808000 RSI: ffffffff816fddc7 RDI: 0000000000000005 RBP: 0000000000000003 R08: 0000000000000005 R09: 0000000000000000 R10: 0000000000000001 R11: 0000000000000001 R12: ffffed101736803d R13: 0000000000000001 R14: 0000000000000001 R15: dffffc0000000000 on_each_cpu_cond_mask+0x56/0xa0 kernel/smp.c:1154 on_each_cpu include/linux/smp.h:71 [inline] text_poke_sync arch/x86/kernel/alternative.c:1231 [inline] text_poke_bp_batch+0x233/0x6c0 arch/x86/kernel/alternative.c:1419 text_poke_bp+0xad/0x110 arch/x86/kernel/alternative.c:1635 arch_static_call_transform+0x4d/0x90 arch/x86/kernel/static_call.c:107 __static_call_update+0xcf/0x620 kernel/static_call_inline.c:136 tracepoint_update_call kernel/tracepoint.c:317 [inline] tracepoint_remove_func kernel/tracepoint.c:441 [inline] tracepoint_probe_unregister+0x9d0/0xc30 kernel/tracepoint.c:551 bpf_raw_tp_link_release+0x51/0xa0 kernel/bpf/syscall.c:3110 bpf_link_free+0xe6/0x1b0 kernel/bpf/syscall.c:2693 bpf_link_put+0x161/0x1b0 kernel/bpf/syscall.c:2719 bpf_link_release+0x33/0x40 kernel/bpf/syscall.c:2728 __fput+0x277/0x9d0 fs/file_table.c:317 task_work_run+0xdd/0x1a0 kernel/task_work.c:177 resume_user_mode_work include/linux/resume_user_mode.h:49 [inline] exit_to_user_mode_loop kernel/entry/common.c:169 [inline] exit_to_user_mode_prepare+0x23c/0x250 kernel/entry/common.c:201 __syscall_exit_to_user_mode_work kernel/entry/common.c:283 [inline] syscall_exit_to_user_mode+0x19/0x50 kernel/entry/common.c:294 do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86 entry_SYSCALL_64_after_hwframe+0x46/0xb0 RIP: 0033:0x7f340c03bd4b ================================ WARNING: inconsistent lock state 5.19.0-rc3-syzkaller #0 Not tainted -------------------------------- inconsistent {HARDIRQ-ON-W} -> {IN-HARDIRQ-W} usage. syz-executor.1/25834 [HC1[1]:SC0[0]:HE0:SE1] takes: ffffffff8beb88d8 (vmap_area_lock){?.+.}-{2:2}, at: spin_lock include/linux/spinlock.h:349 [inline] ffffffff8beb88d8 (vmap_area_lock){?.+.}-{2:2}, at: find_vmap_area+0x1c/0x130 mm/vmalloc.c:1805 {HARDIRQ-ON-W} state was registered at: lock_acquire kernel/locking/lockdep.c:5665 [inline] lock_acquire+0x1ab/0x570 kernel/locking/lockdep.c:5630 __raw_spin_lock include/linux/spinlock_api_smp.h:133 [inline] _raw_spin_lock+0x2a/0x40 kernel/locking/spinlock.c:154 spin_lock include/linux/spinlock.h:349 [inline] alloc_vmap_area+0xa49/0x1f00 mm/vmalloc.c:1586 __get_vm_area_node+0x142/0x3f0 mm/vmalloc.c:2453 get_vm_area_caller+0x43/0x50 mm/vmalloc.c:2506 __ioremap_caller.constprop.0+0x292/0x600 arch/x86/mm/ioremap.c:280 acpi_os_ioremap include/acpi/acpi_io.h:13 [inline] acpi_map drivers/acpi/osl.c:296 [inline] acpi_os_map_iomem+0x463/0x550 drivers/acpi/osl.c:355 acpi_tb_acquire_table+0xd8/0x209 drivers/acpi/acpica/tbdata.c:142 acpi_tb_validate_table drivers/acpi/acpica/tbdata.c:317 [inline] acpi_tb_validate_table+0x50/0x8c drivers/acpi/acpica/tbdata.c:308 acpi_tb_verify_temp_table+0x84/0x674 drivers/acpi/acpica/tbdata.c:504 acpi_reallocate_root_table+0x374/0x3e0 drivers/acpi/acpica/tbxface.c:180 acpi_early_init+0x13a/0x438 drivers/acpi/bus.c:1200 start_kernel+0x3cf/0x48f init/main.c:1098 secondary_startup_64_no_verify+0xce/0xdb irq event stamp: 26172 hardirqs last enabled at (26171): [] asm_sysvec_apic_timer_interrupt+0x1b/0x20 arch/x86/include/asm/idtentry.h:649 hardirqs last disabled at (26172): [] sysvec_apic_timer_interrupt+0xb/0xc0 arch/x86/kernel/apic/apic.c:1106 softirqs last enabled at (5506): [] invoke_softirq kernel/softirq.c:445 [inline] softirqs last enabled at (5506): [] __irq_exit_rcu+0x123/0x180 kernel/softirq.c:650 softirqs last disabled at (5459): [] invoke_softirq kernel/softirq.c:445 [inline] softirqs last disabled at (5459): [] __irq_exit_rcu+0x123/0x180 kernel/softirq.c:650 other info that might help us debug this: Possible unsafe locking scenario: CPU0 ---- lock(vmap_area_lock); lock(vmap_area_lock); *** DEADLOCK *** 4 locks held by syz-executor.1/25834: #0: ffffffff8bdeefa8 (tracepoints_mutex){+.+.}-{3:3}, at: tracepoint_probe_unregister+0x2d/0xc30 kernel/tracepoint.c:548 #1: ffffffff8bc34170 (cpu_hotplug_lock){++++}-{0:0}, at: __static_call_update+0x87/0x620 kernel/static_call_inline.c:128 #2: ffffffff8be5cd88 (static_call_mutex){+.+.}-{3:3}, at: static_call_lock kernel/static_call_inline.c:25 [inline] #2: ffffffff8be5cd88 (static_call_mutex){+.+.}-{3:3}, at: __static_call_update+0x95/0x620 kernel/static_call_inline.c:129 #3: ffffffff8bc4f388 (text_mutex){+.+.}-{3:3}, at: arch_static_call_transform+0x1f/0x90 arch/x86/kernel/static_call.c:103 stack backtrace: CPU: 0 PID: 25834 Comm: syz-executor.1 Not tainted 5.19.0-rc3-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106 print_usage_bug kernel/locking/lockdep.c:3961 [inline] valid_state kernel/locking/lockdep.c:3973 [inline] mark_lock_irq kernel/locking/lockdep.c:4176 [inline] mark_lock.part.0.cold+0x18/0xd8 kernel/locking/lockdep.c:4632 mark_lock kernel/locking/lockdep.c:4596 [inline] mark_usage kernel/locking/lockdep.c:4524 [inline] __lock_acquire+0x14ad/0x5660 kernel/locking/lockdep.c:5007 lock_acquire kernel/locking/lockdep.c:5665 [inline] lock_acquire+0x1ab/0x570 kernel/locking/lockdep.c:5630 __raw_spin_lock include/linux/spinlock_api_smp.h:133 [inline] _raw_spin_lock+0x2a/0x40 kernel/locking/spinlock.c:154 spin_lock include/linux/spinlock.h:349 [inline] find_vmap_area+0x1c/0x130 mm/vmalloc.c:1805 check_heap_object mm/usercopy.c:176 [inline] __check_object_size mm/usercopy.c:250 [inline] __check_object_size+0x1f8/0x700 mm/usercopy.c:212 check_object_size include/linux/thread_info.h:199 [inline] __copy_from_user_inatomic include/linux/uaccess.h:62 [inline] copy_from_user_nmi arch/x86/lib/usercopy.c:47 [inline] copy_from_user_nmi+0xcb/0x130 arch/x86/lib/usercopy.c:31 copy_code arch/x86/kernel/dumpstack.c:91 [inline] show_opcodes+0x59/0xb0 arch/x86/kernel/dumpstack.c:121 show_iret_regs+0xd/0x33 arch/x86/kernel/dumpstack.c:149 __show_regs+0x1e/0x60 arch/x86/kernel/process_64.c:74 show_trace_log_lvl+0x25b/0x2ba arch/x86/kernel/dumpstack.c:292 __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106 nmi_cpu_backtrace.cold+0x47/0x144 lib/nmi_backtrace.c:111 nmi_trigger_cpumask_backtrace+0x1e6/0x230 lib/nmi_backtrace.c:62 trigger_single_cpu_backtrace include/linux/nmi.h:164 [inline] rcu_check_gp_kthread_starvation.cold+0x1fb/0x200 kernel/rcu/tree_stall.h:518 print_other_cpu_stall kernel/rcu/tree_stall.h:623 [inline] check_cpu_stall kernel/rcu/tree_stall.h:771 [inline] rcu_pending kernel/rcu/tree.c:3977 [inline] rcu_sched_clock_irq+0x2316/0x2370 kernel/rcu/tree.c:2675 update_process_times+0x11a/0x1a0 kernel/time/timer.c:1839 tick_sched_handle+0x9b/0x180 kernel/time/tick-sched.c:243 tick_sched_timer+0xee/0x120 kernel/time/tick-sched.c:1481 __run_hrtimer kernel/time/hrtimer.c:1685 [inline] __hrtimer_run_queues+0x1c0/0xe50 kernel/time/hrtimer.c:1749 hrtimer_interrupt+0x31c/0x790 kernel/time/hrtimer.c:1811 local_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1095 [inline] __sysvec_apic_timer_interrupt+0x146/0x530 arch/x86/kernel/apic/apic.c:1112 sysvec_apic_timer_interrupt+0x8e/0xc0 arch/x86/kernel/apic/apic.c:1106 asm_sysvec_apic_timer_interrupt+0x1b/0x20 arch/x86/include/asm/idtentry.h:649 RIP: 0010:csd_lock_wait kernel/smp.c:414 [inline] RIP: 0010:smp_call_function_many_cond+0x499/0x1110 kernel/smp.c:988 Code: 01 89 ee e8 19 94 0a 00 85 ed 74 47 48 8b 04 24 49 89 c4 83 e0 07 49 c1 ec 03 48 89 c5 4d 01 fc 83 c5 03 e8 b9 97 0a 00 f3 90 <41> 0f b6 04 24 40 38 c5 7c 08 84 c0 0f 85 21 0a 00 00 8b 43 08 31 RSP: 0018:ffffc900069d7948 EFLAGS: 00000293 RAX: 0000000000000000 RBX: ffff8880b9b401e0 RCX: 0000000000000000 RDX: ffff888020808000 RSI: ffffffff816fddc7 RDI: 0000000000000005 RBP: 0000000000000003 R08: 0000000000000005 R09: 0000000000000000 R10: 0000000000000001 R11: 0000000000000001 R12: ffffed101736803d R13: 0000000000000001 R14: 0000000000000001 R15: dffffc0000000000 on_each_cpu_cond_mask+0x56/0xa0 kernel/smp.c:1154 on_each_cpu include/linux/smp.h:71 [inline] text_poke_sync arch/x86/kernel/alternative.c:1231 [inline] text_poke_bp_batch+0x233/0x6c0 arch/x86/kernel/alternative.c:1419 text_poke_bp+0xad/0x110 arch/x86/kernel/alternative.c:1635 arch_static_call_transform+0x4d/0x90 arch/x86/kernel/static_call.c:107 __static_call_update+0xcf/0x620 kernel/static_call_inline.c:136 tracepoint_update_call kernel/tracepoint.c:317 [inline] tracepoint_remove_func kernel/tracepoint.c:441 [inline] tracepoint_probe_unregister+0x9d0/0xc30 kernel/tracepoint.c:551 bpf_raw_tp_link_release+0x51/0xa0 kernel/bpf/syscall.c:3110 bpf_link_free+0xe6/0x1b0 kernel/bpf/syscall.c:2693 bpf_link_put+0x161/0x1b0 kernel/bpf/syscall.c:2719 bpf_link_release+0x33/0x40 kernel/bpf/syscall.c:2728 __fput+0x277/0x9d0 fs/file_table.c:317 task_work_run+0xdd/0x1a0 kernel/task_work.c:177 resume_user_mode_work include/linux/resume_user_mode.h:49 [inline] exit_to_user_mode_loop kernel/entry/common.c:169 [inline] exit_to_user_mode_prepare+0x23c/0x250 kernel/entry/common.c:201 __syscall_exit_to_user_mode_work kernel/entry/common.c:283 [inline] syscall_exit_to_user_mode+0x19/0x50 kernel/entry/common.c:294 do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86 entry_SYSCALL_64_after_hwframe+0x46/0xb0 RIP: 0033:0x7f340c03bd4b Code: 0f 05 48 3d 00 f0 ff ff 77 45 c3 0f 1f 40 00 48 83 ec 18 89 7c 24 0c e8 63 fc ff ff 8b 7c 24 0c 41 89 c0 b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 35 44 89 c7 89 44 24 0c e8 a1 fc ff ff 8b 44 RSP: 002b:00007ffe5f7eb9d0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 RAX: 0000000000000000 RBX: 0000000000000005 RCX: 00007f340c03bd4b RDX: 0000001b33820000 RSI: 00007f340be01058 RDI: 0000000000000004 RBP: 00007f340c19d960 R08: 0000000000000000 R09: 00000000d1add44d R10: 00007ffe5f7f0090 R11: 0000000000000293 R12: 0000000000272f67 R13: 00007ffe5f7ebad0 R14: 00007f340c19c100 R15: 0000000000000032 Code: 0f 05 48 3d 00 f0 ff ff 77 45 c3 0f 1f 40 00 48 83 ec 18 89 7c 24 0c e8 63 fc ff ff 8b 7c 24 0c 41 89 c0 b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 35 44 89 c7 89 44 24 0c e8 a1 fc ff ff 8b 44 RSP: 002b:00007ffe5f7eb9d0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 RAX: 0000000000000000 RBX: 0000000000000005 RCX: 00007f340c03bd4b RDX: 0000001b33820000 RSI: 00007f340be01058 RDI: 0000000000000004 RBP: 00007f340c19d960 R08: 0000000000000000 R09: 00000000d1add44d R10: 00007ffe5f7f0090 R11: 0000000000000293 R12: 0000000000272f67 R13: 00007ffe5f7ebad0 R14: 00007f340c19c100 R15: 0000000000000032 watchdog: BUG: soft lockup - CPU#0 stuck for 246s! [syz-executor.1:25834] Modules linked in: irq event stamp: 26172 hardirqs last enabled at (26171): [] asm_sysvec_apic_timer_interrupt+0x1b/0x20 arch/x86/include/asm/idtentry.h:649 hardirqs last disabled at (26172): [] sysvec_apic_timer_interrupt+0xb/0xc0 arch/x86/kernel/apic/apic.c:1106 softirqs last enabled at (5506): [] invoke_softirq kernel/softirq.c:445 [inline] softirqs last enabled at (5506): [] __irq_exit_rcu+0x123/0x180 kernel/softirq.c:650 softirqs last disabled at (5459): [] invoke_softirq kernel/softirq.c:445 [inline] softirqs last disabled at (5459): [] __irq_exit_rcu+0x123/0x180 kernel/softirq.c:650 CPU: 0 PID: 25834 Comm: syz-executor.1 Not tainted 5.19.0-rc3-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:csd_lock_wait kernel/smp.c:414 [inline] RIP: 0010:smp_call_function_many_cond+0x499/0x1110 kernel/smp.c:988 Code: 01 89 ee e8 19 94 0a 00 85 ed 74 47 48 8b 04 24 49 89 c4 83 e0 07 49 c1 ec 03 48 89 c5 4d 01 fc 83 c5 03 e8 b9 97 0a 00 f3 90 <41> 0f b6 04 24 40 38 c5 7c 08 84 c0 0f 85 21 0a 00 00 8b 43 08 31 RSP: 0018:ffffc900069d7948 EFLAGS: 00000293 RAX: 0000000000000000 RBX: ffff8880b9b401e0 RCX: 0000000000000000 RDX: ffff888020808000 RSI: ffffffff816fddc7 RDI: 0000000000000005 RBP: 0000000000000003 R08: 0000000000000005 R09: 0000000000000000 R10: 0000000000000001 R11: 0000000000000001 R12: ffffed101736803d R13: 0000000000000001 R14: 0000000000000001 R15: dffffc0000000000 FS: 000055555660c400(0000) GS:ffff8880b9a00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f18f5b6c058 CR3: 0000000055336000 CR4: 0000000000350ef0 Call Trace: on_each_cpu_cond_mask+0x56/0xa0 kernel/smp.c:1154 on_each_cpu include/linux/smp.h:71 [inline] text_poke_sync arch/x86/kernel/alternative.c:1231 [inline] text_poke_bp_batch+0x233/0x6c0 arch/x86/kernel/alternative.c:1419 text_poke_bp+0xad/0x110 arch/x86/kernel/alternative.c:1635 arch_static_call_transform+0x4d/0x90 arch/x86/kernel/static_call.c:107 __static_call_update+0xcf/0x620 kernel/static_call_inline.c:136 tracepoint_update_call kernel/tracepoint.c:317 [inline] tracepoint_remove_func kernel/tracepoint.c:441 [inline] tracepoint_probe_unregister+0x9d0/0xc30 kernel/tracepoint.c:551 bpf_raw_tp_link_release+0x51/0xa0 kernel/bpf/syscall.c:3110 bpf_link_free+0xe6/0x1b0 kernel/bpf/syscall.c:2693 bpf_link_put+0x161/0x1b0 kernel/bpf/syscall.c:2719 bpf_link_release+0x33/0x40 kernel/bpf/syscall.c:2728 __fput+0x277/0x9d0 fs/file_table.c:317 task_work_run+0xdd/0x1a0 kernel/task_work.c:177 resume_user_mode_work include/linux/resume_user_mode.h:49 [inline] exit_to_user_mode_loop kernel/entry/common.c:169 [inline] exit_to_user_mode_prepare+0x23c/0x250 kernel/entry/common.c:201 __syscall_exit_to_user_mode_work kernel/entry/common.c:283 [inline] syscall_exit_to_user_mode+0x19/0x50 kernel/entry/common.c:294 do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86 entry_SYSCALL_64_after_hwframe+0x46/0xb0 RIP: 0033:0x7f340c03bd4b Code: 0f 05 48 3d 00 f0 ff ff 77 45 c3 0f 1f 40 00 48 83 ec 18 89 7c 24 0c e8 63 fc ff ff 8b 7c 24 0c 41 89 c0 b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 35 44 89 c7 89 44 24 0c e8 a1 fc ff ff 8b 44 RSP: 002b:00007ffe5f7eb9d0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 RAX: 0000000000000000 RBX: 0000000000000005 RCX: 00007f340c03bd4b RDX: 0000001b33820000 RSI: 00007f340be01058 RDI: 0000000000000004 RBP: 00007f340c19d960 R08: 0000000000000000 R09: 00000000d1add44d R10: 00007ffe5f7f0090 R11: 0000000000000293 R12: 0000000000272f67 R13: 00007ffe5f7ebad0 R14: 00007f340c19c100 R15: 0000000000000032 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 PID: 2966 Comm: klogd Not tainted 5.19.0-rc3-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:__sanitizer_cov_trace_const_cmp1+0x4/0x20 kernel/kcov.c:283 Code: 00 00 00 0f 1f 00 48 8b 0c 24 48 89 f2 48 89 fe bf 06 00 00 00 e9 fc fe ff ff 66 66 2e 0f 1f 84 00 00 00 00 00 90 48 8b 0c 24 <40> 0f b6 d6 40 0f b6 f7 bf 01 00 00 00 e9 da fe ff ff 66 2e 0f 1f RSP: 0018:ffffc900001f0e38 EFLAGS: 00000046 RAX: 0000000000000001 RBX: ffff88807a4a9b40 RCX: ffffffff816ab65d RDX: fffffbfff1b770a3 RSI: 0000000000000001 RDI: 0000000000000000 RBP: 0000000000000001 R08: 0000000000000000 R09: ffffffff8dbb8517 R10: fffffbfff1b770a2 R11: 0000000000000001 R12: 0000000000000001 R13: ffff8880b9b2a600 R14: ffff8880b9b2a500 R15: 0000000000000001 FS: 00007faec0559800(0000) GS:ffff8880b9b00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f0a696d5400 CR3: 0000000022627000 CR4: 0000000000350ee0 Call Trace: trace_hrtimer_expire_exit include/trace/events/timer.h:282 [inline] __run_hrtimer kernel/time/hrtimer.c:1688 [inline] __hrtimer_run_queues+0x22d/0xe50 kernel/time/hrtimer.c:1749 hrtimer_interrupt+0x31c/0x790 kernel/time/hrtimer.c:1811 local_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1095 [inline] __sysvec_apic_timer_interrupt+0x146/0x530 arch/x86/kernel/apic/apic.c:1112 sysvec_apic_timer_interrupt+0x8e/0xc0 arch/x86/kernel/apic/apic.c:1106 asm_sysvec_apic_timer_interrupt+0x1b/0x20 arch/x86/include/asm/idtentry.h:649 RIP: 0010:do_slab_free mm/slub.c:3448 [inline] RIP: 0010:___cache_free+0xc4/0x400 mm/slub.c:3514 Code: 00 49 89 ef 48 89 ef e8 ea 53 ff ff 48 8b 00 f6 c4 02 74 12 4d 85 ff 74 0d 4c 8b 7d 38 4d 85 ff 0f 85 c4 00 00 00 49 8b 45 00 <65> 48 03 05 ac 13 3b 7e 48 8b 50 08 4c 39 60 10 0f 85 d9 02 00 00 RSP: 0018:ffffc90002d6f838 EFLAGS: 00000246 RAX: 0000000000040f50 RBX: ffff888048dc9100 RCX: 0000000000000000 RDX: 0000000000000000 RSI: ffffffff81364ca4 RDI: ffffea0001237200 RBP: ffffea0001237200 R08: 0000000000000007 R09: 0000000000000000 R10: 0000000000000000 R11: 1ffffd40002a5800 R12: ffffea0001237200 R13: ffff888140007500 R14: ffff888048dc9100 R15: 0000000000000000 qlink_free mm/kasan/quarantine.c:168 [inline] qlist_free_all+0x6a/0x170 mm/kasan/quarantine.c:187 kasan_quarantine_reduce+0x180/0x200 mm/kasan/quarantine.c:294 __kasan_slab_alloc+0xa2/0xc0 mm/kasan/common.c:446 kasan_slab_alloc include/linux/kasan.h:224 [inline] slab_post_alloc_hook mm/slab.h:750 [inline] slab_alloc_node mm/slub.c:3214 [inline] __kmalloc_node_track_caller+0x238/0x360 mm/slub.c:4950 kmalloc_reserve net/core/skbuff.c:354 [inline] __alloc_skb+0xde/0x340 net/core/skbuff.c:426 alloc_skb include/linux/skbuff.h:1426 [inline] alloc_skb_with_frags+0x93/0x730 net/core/skbuff.c:5992 sock_alloc_send_pskb+0x793/0x920 net/core/sock.c:2662 unix_dgram_sendmsg+0x425/0x1ad0 net/unix/af_unix.c:1895 sock_sendmsg_nosec net/socket.c:714 [inline] sock_sendmsg+0xcf/0x120 net/socket.c:734 __sys_sendto+0x21a/0x320 net/socket.c:2119 __do_sys_sendto net/socket.c:2131 [inline] __se_sys_sendto net/socket.c:2127 [inline] __x64_sys_sendto+0xdd/0x1b0 net/socket.c:2127 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x46/0xb0 RIP: 0033:0x7faec06f50ac Code: 89 02 48 c7 c0 ff ff ff ff eb b8 0f 1f 00 41 89 ca 64 8b 04 25 18 00 00 00 85 c0 75 19 45 31 c9 45 31 c0 b8 2c 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 64 c3 0f 1f 00 55 48 83 ec 20 48 89 54 24 10 RSP: 002b:00007ffd5b74b4c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002c RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007faec06f50ac RDX: 000000000000004a RSI: 00005574a6c2c5c0 RDI: 0000000000000003 RBP: 00005574a6c22910 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000004000 R11: 0000000000000246 R12: 0000000000000014 R13: 0000000000000001 R14: 00007faec087077d R15: 00007ffd5b74b5d8 ---------------- Code disassembly (best guess): 0: 0f 0b ud2 2: 48 83 c4 60 add $0x60,%rsp 6: 5b pop %rbx 7: 5d pop %rbp 8: 41 5c pop %r12 a: c3 retq b: 48 05 00 80 00 00 add $0x8000,%rax 11: 48 89 fb mov %rdi,%rbx 14: 48 39 c7 cmp %rax,%rdi 17: 0f 82 2b 0b 6d 07 jb 0x76d0b48 1d: eb e1 jmp 0x0 1f: cc int3 20: cc int3 21: cc int3 22: cc int3 23: cc int3 24: cc int3 25: cc int3 26: 48 8b 0c 24 mov (%rsp),%rcx * 2a: 89 f6 mov %esi,%esi <-- trapping instruction 2c: 31 d2 xor %edx,%edx 2e: e9 b3 fa ff ff jmpq 0xfffffae6 33: 0f 1f 00 nopl (%rax) 36: 48 8b 0c 24 mov (%rsp),%rcx 3a: 89 f6 mov %esi,%esi 3c: ba .byte 0xba 3d: 01 00 add %eax,(%rax)