watchdog: BUG: soft lockup - CPU#1 stuck for 123s! [syz-executor.2:11040] Modules linked in: irq event stamp: 0 hardirqs last enabled at (0): [<0000000000000000>] 0x0 hardirqs last disabled at (0): [] copy_process+0x1e4b/0x7550 kernel/fork.c:2063 softirqs last enabled at (0): [] copy_process+0x1e8c/0x7550 kernel/fork.c:2067 softirqs last disabled at (0): [<0000000000000000>] 0x0 CPU: 1 PID: 11040 Comm: syz-executor.2 Not tainted 5.14.0-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:preempt_count_add+0x4a/0x140 kernel/sched/core.c:5403 Code: c0 03 0f b6 14 11 38 d0 7c 08 84 d2 0f 85 e1 00 00 00 8b 15 48 ec d2 0e 65 01 1d 61 44 b2 7e 85 d2 75 11 65 8b 05 56 44 b2 7e <0f> b6 c0 3d f4 00 00 00 7f 64 65 8b 05 45 44 b2 7e 25 ff ff ff 7f RSP: 0018:ffffc90000dc0778 EFLAGS: 00000246 RAX: 0000000000000102 RBX: 0000000000000001 RCX: 1ffffffff20452fc RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000001 RBP: 0000000000000001 R08: ffffffff8e7cf586 R09: 0000000000000001 R10: fffff520001b8118 R11: 0000000000086088 R12: ffffc90000dc08b0 R13: 0000000000000000 R14: ffffc90000dc0868 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f7741b1d718 CR3: 000000000b68e000 CR4: 0000000000350ee0 Call Trace: unwind_next_frame+0x120/0x1ce0 arch/x86/kernel/unwind_orc.c:428 arch_stack_walk+0x7d/0xe0 arch/x86/kernel/stacktrace.c:25 stack_trace_save+0x8c/0xc0 kernel/stacktrace.c:121 kasan_save_stack+0x1b/0x40 mm/kasan/common.c:38 kasan_set_track+0x1c/0x30 mm/kasan/common.c:46 kasan_set_free_info+0x20/0x30 mm/kasan/generic.c:360 ____kasan_slab_free mm/kasan/common.c:366 [inline] ____kasan_slab_free mm/kasan/common.c:328 [inline] __kasan_slab_free+0xff/0x130 mm/kasan/common.c:374 kasan_slab_free include/linux/kasan.h:230 [inline] slab_free_hook mm/slub.c:1628 [inline] slab_free_freelist_hook+0xe3/0x250 mm/slub.c:1653 slab_free mm/slub.c:3213 [inline] kmem_cache_free+0x8a/0x5b0 mm/slub.c:3229 kfree_skbmem+0xef/0x1b0 net/core/skbuff.c:699 __kfree_skb net/core/skbuff.c:756 [inline] consume_skb net/core/skbuff.c:911 [inline] consume_skb+0xcf/0x160 net/core/skbuff.c:905 mac80211_hwsim_tx_frame+0x1f6/0x2a0 drivers/net/wireless/mac80211_hwsim.c:1785 mac80211_hwsim_beacon_tx+0x49b/0x930 drivers/net/wireless/mac80211_hwsim.c:1838 __iterate_interfaces+0x1e5/0x520 net/mac80211/util.c:793 ieee80211_iterate_active_interfaces_atomic+0x70/0x180 net/mac80211/util.c:829 mac80211_hwsim_beacon+0xd5/0x1a0 drivers/net/wireless/mac80211_hwsim.c:1861 __run_hrtimer kernel/time/hrtimer.c:1685 [inline] __hrtimer_run_queues+0x609/0xe50 kernel/time/hrtimer.c:1749 hrtimer_run_softirq+0x17b/0x360 kernel/time/hrtimer.c:1766 __do_softirq+0x29b/0x9c2 kernel/softirq.c:558 invoke_softirq kernel/softirq.c:432 [inline] __irq_exit_rcu+0x123/0x180 kernel/softirq.c:636 irq_exit_rcu+0x5/0x20 kernel/softirq.c:648 sysvec_apic_timer_interrupt+0x93/0xc0 arch/x86/kernel/apic/apic.c:1097 asm_sysvec_apic_timer_interrupt+0x12/0x20 arch/x86/include/asm/idtentry.h:638 RIP: 0010:unlock_page_memcg+0xa/0x2c0 mm/memcontrol.c:2065 Code: 38 e9 f9 fb ff ff 4c 89 c7 4c 89 44 24 38 e8 3d 64 fa ff 4c 8b 44 24 38 e9 bb fb ff ff 0f 1f 00 48 b8 00 00 00 00 00 fc ff df <41> 54 55 48 89 fd 48 83 c7 08 48 89 fa 53 48 c1 ea 03 48 83 ec 08 RSP: 0018:ffffc90001d0f7a8 EFLAGS: 00000286 RAX: dffffc0000000000 RBX: 0000000000000000 RCX: 0000000000000000 RDX: ffff888023648000 RSI: ffffffff81afc827 RDI: ffffea0000d73140 RBP: ffffea0000d73140 R08: 0000000000000001 R09: 0000000000000000 R10: ffffffff81afce3c R11: 0000000000000000 R12: ffffea0000d73148 R13: ffffea0000d72e88 R14: dffffc0000000000 R15: 000000000044a000 zap_pte_range mm/memory.c:1362 [inline] zap_pmd_range mm/memory.c:1481 [inline] zap_pud_range mm/memory.c:1510 [inline] zap_p4d_range mm/memory.c:1531 [inline] unmap_page_range+0xed5/0x2a10 mm/memory.c:1552 unmap_single_vma+0x198/0x310 mm/memory.c:1597 unmap_vmas+0x16d/0x2f0 mm/memory.c:1629 exit_mmap+0x1d0/0x620 mm/mmap.c:3195 __mmput+0x122/0x470 kernel/fork.c:1103 mmput+0x58/0x60 kernel/fork.c:1124 exit_mm kernel/exit.c:501 [inline] do_exit+0xabc/0x2a30 kernel/exit.c:812 do_group_exit+0x125/0x310 kernel/exit.c:922 get_signal+0x47f/0x2160 kernel/signal.c:2823 arch_do_signal_or_restart+0x2a9/0x1c40 arch/x86/kernel/signal.c:865 handle_signal_work kernel/entry/common.c:148 [inline] exit_to_user_mode_loop kernel/entry/common.c:172 [inline] exit_to_user_mode_prepare+0x17d/0x290 kernel/entry/common.c:209 __syscall_exit_to_user_mode_work kernel/entry/common.c:291 [inline] syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:302 do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x4665f9 Code: Unable to access opcode bytes at RIP 0x4665cf. RSP: 002b:00007f5dfff1f188 EFLAGS: 00000246 ORIG_RAX: 000000000000010e RAX: fffffffffffffdfe RBX: 000000000056bf80 RCX: 00000000004665f9 RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000000000040 RBP: 00000000004bfcc4 R08: 0000000020000200 R09: 0000000000000000 R10: 0000000020000140 R11: 0000000000000246 R12: 000000000056bf80 R13: 00007fff354799bf R14: 00007f5dfff1f300 R15: 0000000000022000 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 PID: 11061 Comm: syz-executor.4 Not tainted 5.14.0-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:native_apic_mem_write+0x8/0x10 arch/x86/include/asm/apic.h:110 Code: c7 40 97 ec 8e e8 88 a1 89 00 eb b0 66 0f 1f 44 00 00 be 01 00 00 00 e9 66 22 2d 00 cc cc cc cc cc cc 89 ff 89 b7 00 c0 5f ff 0f 1f 80 00 00 00 00 48 b8 00 00 00 00 00 fc ff df 53 89 fb 48 RSP: 0018:ffffc90000007a98 EFLAGS: 00000046 RAX: dffffc0000000000 RBX: ffffffff8b317a60 RCX: 1ffff11017383f0c RDX: 1ffffffff1662f4c RSI: 0000000000000000 RDI: 00000000000000b0 RBP: ffffc90000007ac8 R08: ffffffff8eed4018 R09: ffffffff8eed400f R10: ffffffff8eed4017 R11: 0000000000000001 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00005654e007c4cf CR3: 00000000331e8000 CR4: 0000000000350ef0 Call Trace: apic_eoi arch/x86/include/asm/apic.h:399 [inline] ack_APIC_irq arch/x86/include/asm/apic.h:445 [inline] __sysvec_irq_work+0x4b/0x3d0 arch/x86/kernel/irq_work.c:19 sysvec_irq_work+0x40/0xc0 arch/x86/kernel/irq_work.c:17 asm_sysvec_irq_work+0x12/0x20 arch/x86/include/asm/idtentry.h:664 RIP: 0010:kasan_quarantine_put+0x9b/0x210 mm/kasan/quarantine.c:223 Code: 10 48 81 fb 00 00 10 00 48 89 58 10 77 78 4d 85 ed 75 6c 9c 58 f6 c4 02 0f 85 23 01 00 00 4d 85 ed b8 01 00 00 00 74 01 fb 5b <5d> 41 5c 41 5d 41 5e c3 e8 c8 d4 bf ff 48 c7 c3 40 dc 04 00 e8 dc RSP: 0018:ffffc90000007b70 EFLAGS: 00000206 RAX: 0000000000000001 RBX: ffff888034fc0800 RCX: 1ffffffff1ada185 RDX: 0000000000000000 RSI: ffffffff817c4251 RDI: ffffffff81bc6865 RBP: ffff888034fc0800 R08: 0000000000000000 R09: 0000000000000000 R10: ffffffff817c4238 R11: 0000000000000000 R12: ffff888010841c80 R13: 0000000000000200 R14: 0000000000000000 R15: 0000000000000000 kasan_slab_free include/linux/kasan.h:230 [inline] slab_free_hook mm/slub.c:1628 [inline] slab_free_freelist_hook+0xe3/0x250 mm/slub.c:1653 slab_free mm/slub.c:3213 [inline] kfree+0xe4/0x540 mm/slub.c:4267 skb_free_head net/core/skbuff.c:654 [inline] skb_release_data+0x65a/0x790 net/core/skbuff.c:676 skb_release_all net/core/skbuff.c:741 [inline] __kfree_skb net/core/skbuff.c:755 [inline] consume_skb net/core/skbuff.c:911 [inline] consume_skb+0xc2/0x160 net/core/skbuff.c:905 mac80211_hwsim_tx_frame+0x1f6/0x2a0 drivers/net/wireless/mac80211_hwsim.c:1785 mac80211_hwsim_beacon_tx+0x49b/0x930 drivers/net/wireless/mac80211_hwsim.c:1838 __iterate_interfaces+0x1e5/0x520 net/mac80211/util.c:793 ieee80211_iterate_active_interfaces_atomic+0x70/0x180 net/mac80211/util.c:829 mac80211_hwsim_beacon+0xd5/0x1a0 drivers/net/wireless/mac80211_hwsim.c:1861 __run_hrtimer kernel/time/hrtimer.c:1685 [inline] __hrtimer_run_queues+0x609/0xe50 kernel/time/hrtimer.c:1749 hrtimer_run_softirq+0x17b/0x360 kernel/time/hrtimer.c:1766 __do_softirq+0x29b/0x9c2 kernel/softirq.c:558 invoke_softirq kernel/softirq.c:432 [inline] __irq_exit_rcu+0x123/0x180 kernel/softirq.c:636 irq_exit_rcu+0x5/0x20 kernel/softirq.c:648 sysvec_apic_timer_interrupt+0x93/0xc0 arch/x86/kernel/apic/apic.c:1097 asm_sysvec_apic_timer_interrupt+0x12/0x20 arch/x86/include/asm/idtentry.h:638 RIP: 0010:preempt_count arch/x86/include/asm/preempt.h:27 [inline] RIP: 0010:check_kcov_mode kernel/kcov.c:163 [inline] RIP: 0010:__sanitizer_cov_trace_pc+0x0/0x60 kernel/kcov.c:197 Code: 01 f0 4d 89 03 e9 63 fd ff ff b9 ff ff ff ff ba 08 00 00 00 4d 8b 03 48 0f bd ca 49 8b 45 00 48 63 c9 e9 64 ff ff ff 0f 1f 00 <65> 8b 05 f9 d6 8b 7e 89 c1 48 8b 34 24 81 e1 00 01 00 00 65 48 8b RSP: 0018:ffffc9000212f7a8 EFLAGS: 00000202 RAX: 0000000000000000 RBX: 0000000000000008 RCX: 0000000000000008 RDX: 0000000000000000 RSI: ffff888035431c40 RDI: 0000000000000003 RBP: ffffea0001f18400 R08: 0000000000000000 R09: ffff888035431c47 R10: ffffffff81aa9758 R11: 0000000000000000 R12: 800000007c611007 R13: 0000000000000000 R14: dffffc0000000000 R15: 00007f09e0a56000 get_current arch/x86/include/asm/current.h:15 [inline] add_mm_rss_vec mm/memory.c:498 [inline] zap_pte_range mm/memory.c:1416 [inline] zap_pmd_range mm/memory.c:1481 [inline] zap_pud_range mm/memory.c:1510 [inline] zap_p4d_range mm/memory.c:1531 [inline] unmap_page_range+0xf74/0x2a10 mm/memory.c:1552 unmap_single_vma+0x198/0x310 mm/memory.c:1597 unmap_vmas+0x16d/0x2f0 mm/memory.c:1629 exit_mmap+0x1d0/0x620 mm/mmap.c:3195 __mmput+0x122/0x470 kernel/fork.c:1103 mmput+0x58/0x60 kernel/fork.c:1124 exit_mm kernel/exit.c:501 [inline] do_exit+0xabc/0x2a30 kernel/exit.c:812 do_group_exit+0x125/0x310 kernel/exit.c:922 get_signal+0x47f/0x2160 kernel/signal.c:2823 arch_do_signal_or_restart+0x2a9/0x1c40 arch/x86/kernel/signal.c:865 handle_signal_work kernel/entry/common.c:148 [inline] exit_to_user_mode_loop kernel/entry/common.c:172 [inline] exit_to_user_mode_prepare+0x17d/0x290 kernel/entry/common.c:209 __syscall_exit_to_user_mode_work kernel/entry/common.c:291 [inline] syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:302 do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x4665f9 Code: Unable to access opcode bytes at RIP 0x4665cf. RSP: 002b:00007f09deecb218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca RAX: fffffffffffffe00 RBX: 000000000056bf88 RCX: 00000000004665f9 RDX: 0000000000000000 RSI: 0000000000000080 RDI: 000000000056bf88 RBP: 000000000056bf80 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf8c R13: 00007fff5ca0baff R14: 00007f09deecb300 R15: 0000000000022000 ---------------- Code disassembly (best guess), 2 bytes skipped: 0: 0f b6 14 11 movzbl (%rcx,%rdx,1),%edx 4: 38 d0 cmp %dl,%al 6: 7c 08 jl 0x10 8: 84 d2 test %dl,%dl a: 0f 85 e1 00 00 00 jne 0xf1 10: 8b 15 48 ec d2 0e mov 0xed2ec48(%rip),%edx # 0xed2ec5e 16: 65 01 1d 61 44 b2 7e add %ebx,%gs:0x7eb24461(%rip) # 0x7eb2447e 1d: 85 d2 test %edx,%edx 1f: 75 11 jne 0x32 21: 65 8b 05 56 44 b2 7e mov %gs:0x7eb24456(%rip),%eax # 0x7eb2447e * 28: 0f b6 c0 movzbl %al,%eax <-- trapping instruction 2b: 3d f4 00 00 00 cmp $0xf4,%eax 30: 7f 64 jg 0x96 32: 65 8b 05 45 44 b2 7e mov %gs:0x7eb24445(%rip),%eax # 0x7eb2447e 39: 25 ff ff ff 7f and $0x7fffffff,%eax