watchdog: BUG: soft lockup - CPU#1 stuck for 143s! [syz-executor.2:27258] Modules linked in: irq event stamp: 16926809 hardirqs last enabled at (16926808): [] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:159 [inline] hardirqs last enabled at (16926808): [] _raw_spin_unlock_irq+0x1f/0x40 kernel/locking/spinlock.c:202 hardirqs last disabled at (16926809): [] sysvec_apic_timer_interrupt+0xb/0xc0 arch/x86/kernel/apic/apic.c:1097 softirqs last enabled at (0): [] copy_process+0x1e8c/0x75a0 kernel/fork.c:2136 softirqs last disabled at (1499): [] invoke_softirq kernel/softirq.c:432 [inline] softirqs last disabled at (1499): [] __irq_exit_rcu+0x123/0x180 kernel/softirq.c:636 CPU: 1 PID: 27258 Comm: syz-executor.2 Not tainted 5.16.0-rc1-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:__raw_spin_unlock_irq include/linux/spinlock_api_smp.h:160 [inline] RIP: 0010:_raw_spin_unlock_irq+0x25/0x40 kernel/locking/spinlock.c:202 Code: 0f 1f 44 00 00 55 48 8b 74 24 08 48 89 fd 48 83 c7 18 e8 ae 2e 15 f8 48 89 ef e8 f6 a4 15 f8 e8 51 64 36 f8 fb bf 01 00 00 00 16 6f 08 f8 65 8b 05 2f bd bb 76 85 c0 74 02 5d c3 e8 4b 92 b9 RSP: 0018:ffffc90000fd8e08 EFLAGS: 00000202 RAX: 0000000001024858 RBX: ffffffff875d48b0 RCX: 1ffffffff1b21701 RDX: 0000000000000000 RSI: 0000000000000101 RDI: 0000000000000001 RBP: ffff8880b9d28280 R08: 0000000000000001 R09: 0000000000000001 R10: ffffffff817d1748 R11: 0000000000000000 R12: ffffc90000fd8e98 R13: 0000000000000000 R14: dffffc0000000000 R15: ffff8880b9d28280 FS: 00007fcf657c6700(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007ff06f379718 CR3: 000000001987b000 CR4: 00000000003506e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: expire_timers kernel/time/timer.c:1465 [inline] __run_timers.part.0+0x665/0xa20 kernel/time/timer.c:1734 __run_timers kernel/time/timer.c:1715 [inline] run_timer_softirq+0xb3/0x1d0 kernel/time/timer.c:1747 __do_softirq+0x29b/0x9c2 kernel/softirq.c:558 invoke_softirq kernel/softirq.c:432 [inline] __irq_exit_rcu+0x123/0x180 kernel/softirq.c:636 irq_exit_rcu+0x5/0x20 kernel/softirq.c:648 sysvec_apic_timer_interrupt+0x93/0xc0 arch/x86/kernel/apic/apic.c:1097 asm_sysvec_apic_timer_interrupt+0x12/0x20 arch/x86/include/asm/idtentry.h:638 RIP: 0010:__sanitizer_cov_trace_const_cmp4+0x0/0x70 kernel/kcov.c:286 Code: b7 c9 48 83 c2 01 48 c7 44 30 e0 02 00 00 00 48 89 7c 30 e8 48 89 4c 30 f0 4c 89 54 d8 20 48 89 10 5b c3 0f 1f 80 00 00 00 00 <41> 89 f8 bf 03 00 00 00 4c 8b 14 24 89 f1 65 48 8b 34 25 40 70 02 RSP: 0018:ffffc9000c32f5a0 EFLAGS: 00000246 RAX: 0000000000000000 RBX: 0000000000000003 RCX: 0000000000000003 RDX: 0000000000040000 RSI: 0000000000000000 RDI: 0000000000000000 RBP: ffff888067fb1800 R08: 0000000000000000 R09: 0000000000000003 R10: ffffffff83aa249a R11: 0000000000000010 R12: 0000000000000010 R13: 0000000000000054 R14: dffffc0000000000 R15: 0000000000000000 tomoyo_domain_quota_is_ok+0x307/0x550 security/tomoyo/util.c:1093 tomoyo_supervisor+0x2f2/0xf00 security/tomoyo/common.c:2089 tomoyo_audit_path_log security/tomoyo/file.c:168 [inline] tomoyo_path_permission security/tomoyo/file.c:587 [inline] tomoyo_path_permission+0x270/0x3a0 security/tomoyo/file.c:573 tomoyo_check_open_permission+0x33e/0x380 security/tomoyo/file.c:777 tomoyo_file_open security/tomoyo/tomoyo.c:311 [inline] tomoyo_file_open+0xa3/0xd0 security/tomoyo/tomoyo.c:306 security_file_open+0x45/0xb0 security/security.c:1635 do_dentry_open+0x353/0x1250 fs/open.c:809 do_open fs/namei.c:3426 [inline] path_openat+0x1cad/0x2750 fs/namei.c:3559 do_filp_open+0x1aa/0x400 fs/namei.c:3586 do_sys_openat2+0x16d/0x4d0 fs/open.c:1212 do_sys_open fs/open.c:1228 [inline] __do_sys_openat fs/open.c:1244 [inline] __se_sys_openat fs/open.c:1239 [inline] __x64_sys_openat+0x13f/0x1f0 fs/open.c:1239 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7fcf68250ae9 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fcf657c6188 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 RAX: ffffffffffffffda RBX: 00007fcf68363f60 RCX: 00007fcf68250ae9 RDX: 0000000000000000 RSI: 0000000020000640 RDI: ffffffffffffff9c RBP: 00007fcf682aaf6d R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffcd6cc88bf R14: 00007fcf657c6300 R15: 0000000000022000 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 PID: 27302 Comm: systemd-udevd Not tainted 5.16.0-rc1-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:check_kcov_mode+0x7/0x40 kernel/kcov.c:166 Code: 00 e9 59 fe ff ff 48 8b 7c 24 08 e8 13 37 46 00 e9 61 fd ff ff cc cc cc cc cc cc cc cc cc cc cc cc cc cc 65 8b 05 c9 a1 8b 7e <89> c2 81 e2 00 01 00 00 a9 00 01 ff 00 74 10 31 c0 85 d2 74 15 8b RSP: 0018:ffffc9000c4ef8e8 EFLAGS: 00000206 RAX: 0000000080000000 RBX: 0000000000000005 RCX: ffff888067b66200 RDX: ffff888067b66200 RSI: ffff888067b66200 RDI: 0000000000000003 RBP: ffff888078683e80 R08: 0000000000000000 R09: 0000000000000005 R10: ffffffff83aa249a R11: 0000000000000010 R12: 0000000000000002 R13: 00000000000001bb R14: dffffc0000000000 R15: 0000000000000000 FS: 00007f0d813128c0(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000561d3638d838 CR3: 0000000076723000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: write_comp_data kernel/kcov.c:221 [inline] __sanitizer_cov_trace_const_cmp1+0x22/0x80 kernel/kcov.c:273 tomoyo_domain_quota_is_ok+0x32a/0x550 security/tomoyo/util.c:1092 tomoyo_supervisor+0x2f2/0xf00 security/tomoyo/common.c:2089 tomoyo_audit_path_log security/tomoyo/file.c:168 [inline] tomoyo_path_permission security/tomoyo/file.c:587 [inline] tomoyo_path_permission+0x270/0x3a0 security/tomoyo/file.c:573 tomoyo_path_perm+0x39e/0x400 security/tomoyo/file.c:838 tomoyo_path_symlink+0x94/0xe0 security/tomoyo/tomoyo.c:199 security_path_symlink+0xdf/0x150 security/security.c:1165 do_symlinkat+0x106/0x2e0 fs/namei.c:4272 __do_sys_symlink fs/namei.c:4299 [inline] __se_sys_symlink fs/namei.c:4297 [inline] __x64_sys_symlink+0x75/0x90 fs/namei.c:4297 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7f0d80186027 Code: f0 ff ff 73 01 c3 48 8b 0d 6e be 2b 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 58 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 41 be 2b 00 f7 d8 64 89 01 48 RSP: 002b:00007ffdc7447ed8 EFLAGS: 00000202 ORIG_RAX: 0000000000000058 RAX: ffffffffffffffda RBX: 0000561d345ba530 RCX: 00007f0d80186027 RDX: 0000000000000000 RSI: 00007ffdc7447ee0 RDI: 0000561d345b20c0 RBP: 0000000000002623 R08: 00000000000001c0 R09: 0000000000000014 R10: 00007ffdc7447ec0 R11: 0000000000000202 R12: 00007ffdc7447ee0 R13: 0000561d345ba530 R14: 0000000000000003 R15: 000000000000000e ---------------- Code disassembly (best guess): 0: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) 5: 55 push %rbp 6: 48 8b 74 24 08 mov 0x8(%rsp),%rsi b: 48 89 fd mov %rdi,%rbp e: 48 83 c7 18 add $0x18,%rdi 12: e8 ae 2e 15 f8 callq 0xf8152ec5 17: 48 89 ef mov %rbp,%rdi 1a: e8 f6 a4 15 f8 callq 0xf815a515 1f: e8 51 64 36 f8 callq 0xf8366475 24: fb sti 25: bf 01 00 00 00 mov $0x1,%edi * 2a: e8 16 6f 08 f8 callq 0xf8086f45 <-- trapping instruction 2f: 65 8b 05 2f bd bb 76 mov %gs:0x76bbbd2f(%rip),%eax # 0x76bbbd65 36: 85 c0 test %eax,%eax 38: 74 02 je 0x3c 3a: 5d pop %rbp 3b: c3 retq 3c: e8 .byte 0xe8 3d: 4b 92 rex.WXB xchg %rax,%r10 3f: b9 .byte 0xb9