watchdog: BUG: soft lockup - CPU#0 stuck for 22s! [syz-executor3:4582] Modules linked in: irq event stamp: 12617656 hardirqs last enabled at (12617655): [] seqcount_lockdep_reader_access include/linux/seqlock.h:83 [inline] hardirqs last enabled at (12617655): [] read_seqcount_begin include/linux/seqlock.h:164 [inline] hardirqs last enabled at (12617655): [] read_seqbegin include/linux/seqlock.h:433 [inline] hardirqs last enabled at (12617655): [] read_seqbegin_or_lock include/linux/seqlock.h:529 [inline] hardirqs last enabled at (12617655): [] d_walk+0x80f/0xc80 fs/dcache.c:1248 hardirqs last disabled at (12617656): [] interrupt_entry+0xb5/0xf0 arch/x86/entry/entry_64.S:625 softirqs last enabled at (12617324): [] __do_softirq+0x778/0xaf5 kernel/softirq.c:311 softirqs last disabled at (12617317): [] invoke_softirq kernel/softirq.c:365 [inline] softirqs last disabled at (12617317): [] irq_exit+0x1d1/0x200 kernel/softirq.c:405 CPU: 0 PID: 4582 Comm: syz-executor3 Not tainted 4.17.0-rc4+ #14 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:arch_local_irq_restore arch/x86/include/asm/paravirt.h:783 [inline] RIP: 0010:seqcount_lockdep_reader_access include/linux/seqlock.h:83 [inline] RIP: 0010:read_seqcount_begin include/linux/seqlock.h:164 [inline] RIP: 0010:read_seqbegin include/linux/seqlock.h:433 [inline] RIP: 0010:read_seqbegin_or_lock include/linux/seqlock.h:529 [inline] RIP: 0010:d_walk+0x840/0xc80 fs/dcache.c:1248 RSP: 0018:ffff88019de579f8 EFLAGS: 00000293 ORIG_RAX: ffffffffffffff13 RAX: ffff88019de3c740 RBX: 0000000000000293 RCX: 1ffff10033bc79fd RDX: 0000000000000000 RSI: ffffffff81c6995b RDI: 0000000000000293 RBP: ffff88019de57b78 R08: ffff88019de3cf78 R09: 0000000000000006 R10: ffff88019de3c740 R11: 0000000000000000 R12: 0000000000000200 R13: dffffc0000000000 R14: 1ffff10033bcaf82 R15: ffff88019de57b50 FS: 0000000002133940(0000) GS:ffff8801dae00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f870d93fdb8 CR3: 000000019ddf9000 CR4: 00000000001406f0 DR0: 0000000020000000 DR1: 00000000200001c0 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 Call Trace: shrink_dcache_parent+0x179/0x230 fs/dcache.c:1486 vfs_rmdir+0x202/0x470 fs/namei.c:3850 do_rmdir+0x523/0x610 fs/namei.c:3911 __do_sys_rmdir fs/namei.c:3929 [inline] __se_sys_rmdir fs/namei.c:3927 [inline] __x64_sys_rmdir+0x36/0x40 fs/namei.c:3927 do_syscall_64+0x1b1/0x800 arch/x86/entry/common.c:287 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x455777 RSP: 002b:00007ffda75fc328 EFLAGS: 00000206 ORIG_RAX: 0000000000000054 RAX: ffffffffffffffda RBX: 0000000000000065 RCX: 0000000000455777 RDX: 0000000000000000 RSI: 00007ffda75fe0d0 RDI: 00007ffda75fe0d0 RBP: 00007ffda75fe0d0 R08: 0000000000000000 R09: 0000000000000001 R10: 000000000000000a R11: 0000000000000206 R12: 0000000002134940 R13: 0000000000000000 R14: 000000000000090c R15: 0000000000062257 Code: 88 48 89 f8 48 c1 e8 03 42 80 3c 28 00 0f 85 1e 04 00 00 48 83 3d 18 f2 0a 07 00 0f 84 29 02 00 00 e8 35 94 b2 ff 48 89 df 57 9d <0f> 1f 44 00 00 e8 26 94 b2 ff 49 8d 5f 80 48 c1 eb 03 4c 01 eb Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 PID: 4578 Comm: syz-executor0 Not tainted 4.17.0-rc4+ #14 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:memory_is_poisoned_n mm/kasan/kasan.c:213 [inline] RIP: 0010:memory_is_poisoned mm/kasan/kasan.c:241 [inline] RIP: 0010:check_memory_region_inline mm/kasan/kasan.c:257 [inline] RIP: 0010:check_memory_region+0xbd/0x1b0 mm/kasan/kasan.c:267 RSP: 0018:ffff88019f68f968 EFLAGS: 00000246 RAX: ffffed003664f721 RBX: 1ffff1003664f720 RCX: ffffffff815e0571 RDX: 0000000000000001 RSI: 0000000000000004 RDI: ffff8801b327b900 RBP: ffff88019f68f980 R08: ffffed003664f721 R09: ffffed003664f720 R10: ffffed003664f720 R11: ffff8801b327b903 R12: ffffed003664f721 R13: ffff8801b327b910 R14: 0000000000000000 R15: ffff88019f68fb50 FS: 0000000001cca940(0000) GS:ffff8801daf00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000001b31922000 CR3: 000000019f578000 CR4: 00000000001406e0 DR0: 0000000020000000 DR1: 0000000020000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 Call Trace: kasan_check_write+0x14/0x20 mm/kasan/kasan.c:278 atomic_cmpxchg include/asm-generic/atomic-instrumented.h:57 [inline] queued_spin_lock include/asm-generic/qspinlock.h:87 [inline] do_raw_spin_lock+0xc1/0x200 kernel/locking/spinlock_debug.c:113 __raw_spin_lock include/linux/spinlock_api_smp.h:143 [inline] _raw_spin_lock+0x32/0x40 kernel/locking/spinlock.c:144 spin_lock include/linux/spinlock.h:310 [inline] d_walk+0x261/0xc80 fs/dcache.c:1250 shrink_dcache_parent+0x179/0x230 fs/dcache.c:1486 vfs_rmdir+0x202/0x470 fs/namei.c:3850 do_rmdir+0x523/0x610 fs/namei.c:3911 __do_sys_rmdir fs/namei.c:3929 [inline] __se_sys_rmdir fs/namei.c:3927 [inline] __x64_sys_rmdir+0x36/0x40 fs/namei.c:3927 do_syscall_64+0x1b1/0x800 arch/x86/entry/common.c:287 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x455777 RSP: 002b:00007fffb6c84d28 EFLAGS: 00000206 ORIG_RAX: 0000000000000054 RAX: ffffffffffffffda RBX: 0000000000000065 RCX: 0000000000455777 RDX: 0000000000000000 RSI: 00007fffb6c86ad0 RDI: 00007fffb6c86ad0 RBP: 00007fffb6c86ad0 R08: 0000000000000000 R09: 0000000000000001 R10: 000000000000000a R11: 0000000000000206 R12: 0000000001ccb940 R13: 0000000000000000 R14: 00000000000008de R15: 00000000000621a1 Code: 83 c0 08 48 39 c3 0f 84 a8 00 00 00 48 83 38 00 74 ed 4c 8d 40 08 eb 09 48 83 c0 01 49 39 c0 74 0a 80 38 00 74 f2 48 85 c0 75 77 <5b> 41 5c 41 5d 5d c3 41 bd 08 00 00 00 4d 89 c8 41 29 dd 4b 8d