watchdog: BUG: soft lockup - CPU#1 stuck for 22s! [syz-executor.4:27089] Modules linked in: irq event stamp: 4601863 hardirqs last enabled at (4601862): [] trace_hardirqs_on_thunk+0x1a/0x1c hardirqs last disabled at (4601863): [] trace_hardirqs_off_thunk+0x1a/0x1c softirqs last enabled at (0): [] copy_process.part.0+0x15b9/0x8260 kernel/fork.c:1856 softirqs last disabled at (369): [] invoke_softirq kernel/softirq.c:372 [inline] softirqs last disabled at (369): [] irq_exit+0x215/0x260 kernel/softirq.c:412 CPU: 1 PID: 27089 Comm: syz-executor.4 Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:bytes_is_nonzero mm/kasan/kasan.c:166 [inline] RIP: 0010:memory_is_nonzero mm/kasan/kasan.c:184 [inline] RIP: 0010:memory_is_poisoned_n mm/kasan/kasan.c:210 [inline] RIP: 0010:memory_is_poisoned mm/kasan/kasan.c:241 [inline] RIP: 0010:check_memory_region_inline mm/kasan/kasan.c:257 [inline] RIP: 0010:check_memory_region+0xba/0x170 mm/kasan/kasan.c:267 Code: 00 74 f1 48 8d 50 08 eb 09 48 83 c0 01 48 39 d0 74 0e 80 38 00 74 f2 48 85 c0 0f 85 9c 00 00 00 5b 5d 41 5c c3 48 85 d2 74 f6 <48> 01 ea eb 09 48 83 c0 01 48 39 d0 74 e8 80 38 00 74 f2 eb d8 41 RSP: 0018:ffff8880ba107b48 EFLAGS: 00000202 ORIG_RAX: ffffffffffffff13 RAX: ffffed101742455a RBX: ffffed101742455b RCX: ffffffff81518c83 RDX: 0000000000000001 RSI: 0000000000000004 RDI: ffff8880ba122ad0 RBP: ffffed101742455a R08: 0000000000000000 R09: ffffed101742455a R10: ffff8880ba122ad3 R11: 000000005db3ac98 R12: 00000000ffffffff R13: ffff88802e5cb080 R14: 0000000000480020 R15: ffffffff867098b1 FS: 00007fe9d9940700(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fe9d991f718 CR3: 0000000220276000 CR4: 00000000003426e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: atomic_read include/asm-generic/atomic-instrumented.h:21 [inline] rcu_dynticks_curr_cpu_in_eqs kernel/rcu/tree.c:350 [inline] rcu_is_watching+0x53/0xc0 kernel/rcu/tree.c:1025 rcu_read_lock_sched_held+0xc6/0x1d0 kernel/rcu/update.c:113 trace_kmem_cache_alloc_node include/trace/events/kmem.h:109 [inline] kmem_cache_alloc_node+0x351/0x3b0 mm/slab.c:3650 __alloc_skb+0x71/0x560 net/core/skbuff.c:193 alloc_skb include/linux/skbuff.h:995 [inline] mrp_pdu_init net/802/mrp.c:316 [inline] mrp_pdu_append_vecattr_event+0x7d2/0x1050 net/802/mrp.c:415 mrp_attr_event+0x15d/0x220 net/802/mrp.c:510 mrp_mad_event net/802/mrp.c:590 [inline] mrp_join_timer+0x5a/0xc0 net/802/mrp.c:607 call_timer_fn+0x177/0x700 kernel/time/timer.c:1338 expire_timers+0x243/0x4e0 kernel/time/timer.c:1375 __run_timers kernel/time/timer.c:1696 [inline] run_timer_softirq+0x21c/0x670 kernel/time/timer.c:1709 __do_softirq+0x265/0x980 kernel/softirq.c:292 invoke_softirq kernel/softirq.c:372 [inline] irq_exit+0x215/0x260 kernel/softirq.c:412 exiting_irq arch/x86/include/asm/apic.h:536 [inline] smp_apic_timer_interrupt+0x136/0x550 arch/x86/kernel/apic/apic.c:1098 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:894 RIP: 0010:save_stack_trace+0x4/0x20 arch/x86/kernel/stacktrace.c:60 Code: ff 85 c0 48 8b 95 70 ff ff ff 0f 84 c0 fe ff ff e9 e3 fe ff ff 48 89 e9 e9 e2 fe ff ff e8 04 b5 14 00 0f 1f 40 00 83 47 10 01 <31> c9 31 d2 65 48 8b 34 25 c0 df 01 00 e9 5a fe ff ff 66 2e 0f 1f RSP: 0018:ffff88821ea57bd8 EFLAGS: 00000202 ORIG_RAX: ffffffffffffff13 RAX: ffff88821ea57c00 RBX: ffff8880b15add60 RCX: 0000000000000000 RDX: 0000000000000000 RSI: 0000000000000020 RDI: ffff88821ea57be8 RBP: ffff8880b15add60 R08: ffffed10162b5ba8 R09: ffffed10162b5bac R10: 0000000000000000 R11: 0000000000000000 R12: 00000000006200c0 R13: 0000000000000000 R14: ffff88813bff01c0 R15: 0000000000000020 save_stack mm/kasan/kasan.c:448 [inline] set_track mm/kasan/kasan.c:460 [inline] kasan_kmalloc+0xeb/0x160 mm/kasan/kasan.c:553 slab_post_alloc_hook mm/slab.h:445 [inline] slab_alloc mm/slab.c:3397 [inline] __do_kmalloc mm/slab.c:3725 [inline] __kmalloc_track_caller+0x13f/0x3c0 mm/slab.c:3742 memdup_user+0x22/0xb0 mm/util.c:160 strndup_user+0x70/0x120 mm/util.c:217 copy_mount_string fs/namespace.c:2726 [inline] ksys_mount+0x34/0x130 fs/namespace.c:3023 __do_sys_mount fs/namespace.c:3052 [inline] __se_sys_mount fs/namespace.c:3049 [inline] __x64_sys_mount+0xba/0x150 fs/namespace.c:3049 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7fe9dc44ea39 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fe9d9940188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 00007fe9dc552260 RCX: 00007fe9dc44ea39 RDX: 0000000020000040 RSI: 0000000020000080 RDI: 0000000000000000 RBP: 00007fe9dc4a8c5f R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007fff76e46b8f R14: 00007fe9d9940300 R15: 0000000000022000 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 skipped: idling at native_safe_halt+0xe/0x10 arch/x86/include/asm/irqflags.h:60 ---------------- Code disassembly (best guess): 0: 00 74 f1 48 add %dh,0x48(%rcx,%rsi,8) 4: 8d 50 08 lea 0x8(%rax),%edx 7: eb 09 jmp 0x12 9: 48 83 c0 01 add $0x1,%rax d: 48 39 d0 cmp %rdx,%rax 10: 74 0e je 0x20 12: 80 38 00 cmpb $0x0,(%rax) 15: 74 f2 je 0x9 17: 48 85 c0 test %rax,%rax 1a: 0f 85 9c 00 00 00 jne 0xbc 20: 5b pop %rbx 21: 5d pop %rbp 22: 41 5c pop %r12 24: c3 retq 25: 48 85 d2 test %rdx,%rdx 28: 74 f6 je 0x20 * 2a: 48 01 ea add %rbp,%rdx <-- trapping instruction 2d: eb 09 jmp 0x38 2f: 48 83 c0 01 add $0x1,%rax 33: 48 39 d0 cmp %rdx,%rax 36: 74 e8 je 0x20 38: 80 38 00 cmpb $0x0,(%rax) 3b: 74 f2 je 0x2f 3d: eb d8 jmp 0x17 3f: 41 rex.B