bond1013: making interface vlan968 the new active one watchdog: BUG: soft lockup - CPU#1 stuck for 22s! [syz-executor.1:27807] Modules linked in: irq event stamp: 4172259 hardirqs last enabled at (4172258): [] trace_hardirqs_on_thunk+0x1a/0x1c audit: type=1800 audit(1650051539.332:44768): pid=27797 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=14097 res=0 hardirqs last disabled at (4172259): [] trace_hardirqs_off_thunk+0x1a/0x1c softirqs last enabled at (0): [] copy_process.part.0+0x15b9/0x8260 kernel/fork.c:1856 softirqs last disabled at (449): [] invoke_softirq kernel/softirq.c:372 [inline] softirqs last disabled at (449): [] irq_exit+0x215/0x260 kernel/softirq.c:412 CPU: 1 PID: 27807 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:trace_timer_expire_exit include/trace/events/timer.h:121 [inline] RIP: 0010:call_timer_fn+0x1b4/0x700 kernel/time/timer.c:1339 Code: f7 ad 7e bf 07 00 00 00 89 de e8 77 fd 0e 00 83 fb 07 0f 87 21 04 00 00 e8 f9 fb 0e 00 89 db 48 0f a3 1d d7 55 d3 09 0f 92 c3 <31> ff 89 de e8 13 fd 0e 00 84 db 0f 85 f8 02 00 00 e8 d6 fb 0e 00 bond1013: Enslaving vlan968 as an active interface with an up link RSP: 0018:ffff8880ba107d28 EFLAGS: 00000207 ORIG_RAX: ffffffffffffff13 RAX: ffff888036082400 RBX: 0000000000000001 RCX: ffffffff81538969 RDX: 0000000000000100 RSI: ffffffff81538977 RDI: 0000000000000005 RBP: 0000000000000102 R08: 0000000000000000 R09: 0000000000000007 R10: 0000000000000005 R11: 0000000000000000 R12: ffff8880ba107d58 R13: 1ffff11017420fa7 R14: 0000000000000000 R15: 0000000000000000 FS: 00007f89d27a5700(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f89d2784718 CR3: 000000021bbe1000 CR4: 00000000003406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: expire_timers+0x243/0x4e0 kernel/time/timer.c:1375 __run_timers kernel/time/timer.c:1696 [inline] run_timer_softirq+0x21c/0x670 kernel/time/timer.c:1709 __do_softirq+0x265/0x980 kernel/softirq.c:292 invoke_softirq kernel/softirq.c:372 [inline] irq_exit+0x215/0x260 kernel/softirq.c:412 exiting_irq arch/x86/include/asm/apic.h:536 [inline] smp_apic_timer_interrupt+0x136/0x550 arch/x86/kernel/apic/apic.c:1098 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:894 RIP: 0010:__raw_spin_unlock_irq include/linux/spinlock_api_smp.h:169 [inline] RIP: 0010:_raw_spin_unlock_irq+0x50/0x80 kernel/locking/spinlock.c:192 Code: c0 98 82 f1 89 48 ba 00 00 00 00 00 fc ff df 48 c1 e8 03 80 3c 10 00 75 31 48 83 3d 01 31 d8 01 00 74 25 fb 66 0f 1f 44 00 00 01 00 00 00 e8 26 1b 28 f9 65 8b 05 9f 8d e8 77 85 c0 74 02 5d RSP: 0018:ffff888205637560 EFLAGS: 00000286 ORIG_RAX: ffffffffffffff13 RAX: 1ffffffff13e3053 RBX: ffff888036082400 RCX: 1ffff11006c105a4 RDX: dffffc0000000000 RSI: ffff888036082d00 RDI: ffff888036082c84 RBP: ffff8880ba12b0c0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: ffff8880ba12b0c0 R13: ffff88809a064540 R14: 0000000000000000 R15: 0000000000000001 finish_lock_switch kernel/sched/core.c:2578 [inline] finish_task_switch+0x146/0x760 kernel/sched/core.c:2678 context_switch kernel/sched/core.c:2831 [inline] __schedule+0x88f/0x2040 kernel/sched/core.c:3517 preempt_schedule_common+0x45/0xc0 kernel/sched/core.c:3641 ___preempt_schedule+0x16/0x18 __raw_spin_unlock include/linux/spinlock_api_smp.h:152 [inline] _raw_spin_unlock+0x3b/0x40 kernel/locking/spinlock.c:176 spin_unlock include/linux/spinlock.h:369 [inline] ext4_discard_preallocations+0x62d/0xfb0 fs/ext4/mballoc.c:4084 ext4_truncate+0x74e/0x1380 fs/ext4/inode.c:4554 ext4_setattr+0x1c11/0x2560 fs/ext4/inode.c:5709 notify_change+0x70b/0xfc0 fs/attr.c:334 do_truncate+0x134/0x1f0 fs/open.c:63 handle_truncate fs/namei.c:3009 [inline] do_last fs/namei.c:3427 [inline] path_openat+0x2308/0x2df0 fs/namei.c:3537 do_filp_open+0x18c/0x3f0 fs/namei.c:3567 do_sys_open+0x3b3/0x520 fs/open.c:1085 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7f89d3e930e9 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f89d27a5168 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 RAX: ffffffffffffffda RBX: 00007f89d3fa61d0 RCX: 00007f89d3e930e9 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200001c0 RBP: 00007f89d3eed08d R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffe2e1d51df R14: 00007f89d27a5300 R15: 0000000000022000 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 PID: 3575 Comm: kworker/u4:5 Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Workqueue: bat_events batadv_dat_purge RIP: 0010:__read_once_size include/linux/compiler.h:263 [inline] RIP: 0010:check_kcov_mode kernel/kcov.c:69 [inline] RIP: 0010:__sanitizer_cov_trace_pc+0x1c/0x50 kernel/kcov.c:101 Code: 90 90 90 90 90 90 90 90 90 90 90 90 90 90 48 8b 34 24 65 48 8b 04 25 c0 df 01 00 65 8b 15 cc 59 9f 7e 81 e2 00 01 1f 00 75 2b <8b> 90 60 13 00 00 83 fa 02 75 20 48 8b 88 68 13 00 00 8b 80 64 13 RSP: 0018:ffff8880a8e9fc70 EFLAGS: 00000046 RAX: ffff8880a8f82300 RBX: 0000000000000001 RCX: ffffffff8167a95d RDX: 0000000000000000 RSI: ffffffff8167a966 RDI: 0000000000000005 RBP: ffffffff87d70052 R08: 0000000000000001 R09: 0000000000000000 R10: 0000000000000005 R11: 0000000000000000 R12: ffff8880a8f82300 R13: ffff8880449f05a0 R14: ffffffff87d6fac0 R15: 000000000000001c FS: 0000000000000000(0000) GS:ffff8880ba000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000555556c2c848 CR3: 00000000a2a6c000 CR4: 00000000003406f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: preempt_count arch/x86/include/asm/preempt.h:23 [inline] trace_hardirqs_on+0x26/0x210 kernel/trace/trace_preemptirq.c:24 __local_bh_enable_ip+0x159/0x270 kernel/softirq.c:194 spin_unlock_bh include/linux/spinlock.h:374 [inline] __batadv_dat_purge.part.0+0x232/0x330 net/batman-adv/distributed-arp-table.c:151 __batadv_dat_purge net/batman-adv/distributed-arp-table.c:132 [inline] batadv_dat_purge+0x47/0x60 net/batman-adv/distributed-arp-table.c:170 process_one_work+0x864/0x1570 kernel/workqueue.c:2153 worker_thread+0x64c/0x1130 kernel/workqueue.c:2296 kthread+0x33f/0x460 kernel/kthread.c:259 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415 ---------------- Code disassembly (best guess): 0: f7 ad 7e bf 07 00 imull 0x7bf7e(%rbp) 6: 00 00 add %al,(%rax) 8: 89 de mov %ebx,%esi a: e8 77 fd 0e 00 callq 0xefd86 f: 83 fb 07 cmp $0x7,%ebx 12: 0f 87 21 04 00 00 ja 0x439 18: e8 f9 fb 0e 00 callq 0xefc16 1d: 89 db mov %ebx,%ebx 1f: 48 0f a3 1d d7 55 d3 bt %rbx,0x9d355d7(%rip) # 0x9d355fe 26: 09 27: 0f 92 c3 setb %bl * 2a: 31 ff xor %edi,%edi <-- trapping instruction 2c: 89 de mov %ebx,%esi 2e: e8 13 fd 0e 00 callq 0xefd46 33: 84 db test %bl,%bl 35: 0f 85 f8 02 00 00 jne 0x333 3b: e8 d6 fb 0e 00 callq 0xefc16