watchdog: BUG: soft lockup - CPU#0 stuck for 22s! [syz-executor223:4527] Modules linked in: irq event stamp: 12319252 hardirqs last enabled at (12319251): [] seqcount_lockdep_reader_access include/linux/seqlock.h:83 [inline] hardirqs last enabled at (12319251): [] read_seqcount_begin include/linux/seqlock.h:164 [inline] hardirqs last enabled at (12319251): [] read_seqbegin include/linux/seqlock.h:433 [inline] hardirqs last enabled at (12319251): [] read_seqbegin_or_lock include/linux/seqlock.h:529 [inline] hardirqs last enabled at (12319251): [] d_walk+0x80f/0xc80 fs/dcache.c:1248 hardirqs last disabled at (12319252): [] interrupt_entry+0xb5/0xf0 arch/x86/entry/entry_64.S:625 softirqs last enabled at (6473308): [] __do_softirq+0x778/0xaf5 kernel/softirq.c:311 softirqs last disabled at (6473243): [] invoke_softirq kernel/softirq.c:365 [inline] softirqs last disabled at (6473243): [] irq_exit+0x1d1/0x200 kernel/softirq.c:405 CPU: 0 PID: 4527 Comm: syz-executor223 Not tainted 4.17.0-rc4+ #14 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:debug_spin_lock_before kernel/locking/spinlock_debug.c:84 [inline] RIP: 0010:do_raw_spin_lock+0x62/0x200 kernel/locking/spinlock_debug.c:112 RSP: 0018:ffff8801ad2479a0 EFLAGS: 00000a06 ORIG_RAX: ffffffffffffff13 RAX: dffffc0000000000 RBX: ffff8801a816e640 RCX: 0000000000000000 RDX: 1ffff1003502dcca RSI: ffff8801ac096b38 RDI: ffff8801a816e644 RBP: ffff8801ad2479c8 R08: 0000000000004394 R09: 0000000000000004 R10: ffff8801ac096bd8 R11: ffff8801ac096300 R12: ffff8801a816e5c0 R13: ffff8801a816e650 R14: ffff8801a816e640 R15: ffff8801ad247b50 FS: 00000000023ab880(0000) GS:ffff8801dae00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00000000004a39d0 CR3: 00000001ac6fb000 CR4: 00000000001406f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: _raw_spin_lock_nested+0x30/0x40 kernel/locking/spinlock.c:355 d_walk+0x3ad/0xc80 fs/dcache.c:1274 shrink_dcache_parent+0x179/0x230 fs/dcache.c:1486 vfs_rmdir+0x202/0x470 fs/namei.c:3850 do_rmdir+0x523/0x610 fs/namei.c:3911 __do_sys_rmdir fs/namei.c:3929 [inline] __se_sys_rmdir fs/namei.c:3927 [inline] __x64_sys_rmdir+0x36/0x40 fs/namei.c:3927 do_syscall_64+0x1b1/0x800 arch/x86/entry/common.c:287 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x441aa7 RSP: 002b:00007ffed4dd3ce8 EFLAGS: 00000207 ORIG_RAX: 0000000000000054 RAX: ffffffffffffffda RBX: 0000000000000065 RCX: 0000000000441aa7 RDX: 0000000000000000 RSI: 00000000006cd858 RDI: 00007ffed4dd4dd0 RBP: 00007ffed4dd4dd0 R08: 0000000000000000 R09: 0000000000000001 R10: 000000000000000a R11: 0000000000000207 R12: 00000000023ac8a0 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 Code: 08 84 d2 0f 85 7b 01 00 00 81 7b 04 ad 4e ad de 0f 85 f2 00 00 00 48 b8 00 00 00 00 00 fc ff df 4c 8d 6b 10 4c 89 ea 48 c1 ea 03 <80> 3c 02 00 0f 85 68 01 00 00 65 48 8b 04 25 c0 ed 01 00 48 39 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 PID: 4524 Comm: syz-executor223 Not tainted 4.17.0-rc4+ #14 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:bytes_is_nonzero mm/kasan/kasan.c:167 [inline] RIP: 0010:memory_is_nonzero mm/kasan/kasan.c:184 [inline] RIP: 0010:memory_is_poisoned_n mm/kasan/kasan.c:210 [inline] RIP: 0010:memory_is_poisoned mm/kasan/kasan.c:241 [inline] RIP: 0010:check_memory_region_inline mm/kasan/kasan.c:257 [inline] RIP: 0010:check_memory_region+0x117/0x1b0 mm/kasan/kasan.c:267 RSP: 0018:ffff8801ac7474e8 EFLAGS: 00000046 RAX: fffffbfff1446fec RBX: 1ffffffff1446feb RCX: ffffffff815c9ec1 RDX: 0000000000000001 RSI: 0000000000000004 RDI: ffffffff8a237f58 RBP: ffff8801ac747500 R08: fffffbfff1446fec R09: fffffbfff1446feb R10: fffffbfff1446feb R11: ffffffff8a237f5b R12: fffffbfff1446fec R13: 0000000000000000 R14: 0000000000000000 R15: ffff8801a81c5618 FS: 00000000023ab880(0000) GS:ffff8801daf00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00000000023bc918 CR3: 00000001d8f40000 CR4: 00000000001406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: kasan_check_write+0x14/0x20 mm/kasan/kasan.c:278 atomic_inc include/asm-generic/atomic-instrumented.h:102 [inline] __lock_acquire+0x291/0x5140 kernel/locking/lockdep.c:3323 lock_acquire+0x1dc/0x520 kernel/locking/lockdep.c:3920 __raw_spin_lock include/linux/spinlock_api_smp.h:142 [inline] _raw_spin_lock+0x2a/0x40 kernel/locking/spinlock.c:144 spin_lock include/linux/spinlock.h:310 [inline] d_walk+0x261/0xc80 fs/dcache.c:1250 shrink_dcache_parent+0x179/0x230 fs/dcache.c:1486 vfs_rmdir+0x202/0x470 fs/namei.c:3850 do_rmdir+0x523/0x610 fs/namei.c:3911 __do_sys_rmdir fs/namei.c:3929 [inline] __se_sys_rmdir fs/namei.c:3927 [inline] __x64_sys_rmdir+0x36/0x40 fs/namei.c:3927 do_syscall_64+0x1b1/0x800 arch/x86/entry/common.c:287 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x441aa7 RSP: 002b:00007ffed4dd3ce8 EFLAGS: 00000207 ORIG_RAX: 0000000000000054 RAX: ffffffffffffffda RBX: 0000000000000065 RCX: 0000000000441aa7 RDX: 0000000000000000 RSI: 00000000006cd858 RDI: 00007ffed4dd4dd0 RBP: 00007ffed4dd4dd0 R08: 0000000000000000 R09: 0000000000000001 R10: 000000000000000a R11: 0000000000000207 R12: 00000000023ac8a0 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 Code: 0d 00 4d 85 c0 75 3e 4d 89 e0 49 29 c0 e9 6c ff ff ff 4d 85 c0 74 ba 48 b8 01 00 00 00 00 fc ff df 4d 01 c8 48 01 d8 41 80 39 00 <74> 08 e9 8c 00 00 00 48 89 d8 4c 39 c0 74 97 80 38 00 48 8d 58