watchdog: BUG: soft lockup - CPU#0 stuck for 23s! [syz-executor.5:9586] Modules linked in: irq event stamp: 3802045 hardirqs last enabled at (3802044): [] restore_regs_and_return_to_kernel+0x0/0x2a hardirqs last disabled at (3802045): [] apic_timer_interrupt+0x8e/0xa0 arch/x86/entry/entry_64.S:793 softirqs last enabled at (62344): [] __do_softirq+0x68b/0x9ff kernel/softirq.c:314 softirqs last disabled at (63031): [] invoke_softirq kernel/softirq.c:368 [inline] softirqs last disabled at (63031): [] irq_exit+0x193/0x240 kernel/softirq.c:409 CPU: 0 PID: 9586 Comm: syz-executor.5 Not tainted 4.14.268-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 task: ffff888070e04400 task.stack: ffff888070e10000 RIP: 0010:unwind_next_frame+0x36/0x17d0 arch/x86/kernel/unwind_orc.c:323 RSP: 0018:ffff8880ba407668 EFLAGS: 00000a06 ORIG_RAX: ffffffffffffff10 RAX: dffffc0000000000 RBX: 1ffff11017480ed4 RCX: 0000000000000003 RDX: ffff8880ba4077c8 RSI: ffff8880ba407618 RDI: ffff8880ba407728 RBP: ffff8880ba407798 R08: 0000000000000001 R09: 0000000000000001 R10: ffff8880ba407a38 R11: 0000000000000001 R12: ffff8880ba4077b0 R13: 0000000000000000 R14: ffff8880a4c2c980 R15: ffff8880ba407728 FS: 00007f20d861a700(0000) GS:ffff8880ba400000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000055555701b708 CR3: 000000008d05b000 CR4: 00000000003406f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: __save_stack_trace+0x90/0x160 arch/x86/kernel/stacktrace.c:44 save_stack mm/kasan/kasan.c:447 [inline] set_track mm/kasan/kasan.c:459 [inline] kasan_kmalloc+0xeb/0x160 mm/kasan/kasan.c:551 kmem_cache_alloc+0x124/0x3c0 mm/slab.c:3552 dst_alloc+0xed/0x6d0 net/core/dst.c:107 __ip6_dst_alloc net/ipv6/route.c:357 [inline] ip6_dst_alloc+0x39/0x2d0 net/ipv6/route.c:370 icmp6_dst_alloc+0x155/0x580 net/ipv6/route.c:1768 ndisc_send_skb+0xace/0x1390 net/ipv6/ndisc.c:463 ndisc_send_rs+0x125/0x630 net/ipv6/ndisc.c:677 addrconf_rs_timer+0x2bb/0x5a0 net/ipv6/addrconf.c:3769 call_timer_fn+0x14a/0x650 kernel/time/timer.c:1280 expire_timers+0x232/0x4d0 kernel/time/timer.c:1319 __run_timers kernel/time/timer.c:1637 [inline] run_timer_softirq+0x1d5/0x5a0 kernel/time/timer.c:1650 __do_softirq+0x24d/0x9ff kernel/softirq.c:288 invoke_softirq kernel/softirq.c:368 [inline] irq_exit+0x193/0x240 kernel/softirq.c:409 exiting_irq arch/x86/include/asm/apic.h:638 [inline] smp_apic_timer_interrupt+0x141/0x5e0 arch/x86/kernel/apic/apic.c:1106 apic_timer_interrupt+0x93/0xa0 arch/x86/entry/entry_64.S:793 RIP: 0010:compound_head include/linux/page-flags.h:151 [inline] RIP: 0010:PageSwapCache include/linux/page-flags.h:331 [inline] RIP: 0010:free_swap_cache mm/swap_state.c:294 [inline] RIP: 0010:free_pages_and_swap_cache+0x7d/0x210 mm/swap_state.c:322 RSP: 0018:ffff888070e17730 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff10 RAX: 1ffffd400052c274 RBX: ffff888091fe7b90 RCX: 0000000000000000 RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffea0002961560 RBP: ffffea0002961540 R08: ffffed100eb9fc00 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: dffffc0000000000 R13: ffffea0002961380 R14: ffffea00029613a0 R15: dead000000000100 tlb_flush_mmu_free+0xc1/0x1a0 mm/memory.c:272 zap_pte_range mm/memory.c:1431 [inline] zap_pmd_range mm/memory.c:1466 [inline] zap_pud_range mm/memory.c:1495 [inline] zap_p4d_range mm/memory.c:1516 [inline] unmap_page_range+0x1533/0x1ce0 mm/memory.c:1537 unmap_single_vma+0x147/0x2b0 mm/memory.c:1582 unmap_vmas+0x9d/0x160 mm/memory.c:1612 exit_mmap+0x270/0x4d0 mm/mmap.c:3058 __mmput kernel/fork.c:931 [inline] mmput kernel/fork.c:952 [inline] mmput+0xfa/0x420 kernel/fork.c:947 exit_mm kernel/exit.c:548 [inline] do_exit+0x984/0x2850 kernel/exit.c:855 do_group_exit+0x100/0x2e0 kernel/exit.c:965 get_signal+0x38d/0x1ca0 kernel/signal.c:2412 do_signal+0x7c/0x1550 arch/x86/kernel/signal.c:792 exit_to_usermode_loop+0x160/0x200 arch/x86/entry/common.c:160 prepare_exit_to_usermode arch/x86/entry/common.c:199 [inline] syscall_return_slowpath arch/x86/entry/common.c:270 [inline] do_syscall_64+0x4a3/0x640 arch/x86/entry/common.c:297 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x7f20d9ca5049 RSP: 002b:00007f20d861a218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca RAX: fffffffffffffe00 RBX: 00007f20d9db7f68 RCX: 00007f20d9ca5049 RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f20d9db7f68 RBP: 00007f20d9db7f60 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f20d9db7f6c R13: 00007ffe8d788c8f R14: 00007f20d861a300 R15: 0000000000022000 Code: 57 49 89 ff 41 56 41 55 41 54 55 53 48 83 ec 78 48 c7 44 24 38 b3 8a b5 41 48 8d 5c 24 38 48 c7 44 24 40 11 54 b5 88 48 c1 eb 03 <48> c7 44 24 48 80 6f 23 81 48 8d 14 03 c7 02 f1 f1 f1 f1 c7 42 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 PID: 9012 Comm: kworker/1:4 Not tainted 4.14.268-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Workqueue: events netstamp_clear task: ffff88809c0b6240 task.stack: ffff888074cc8000 RIP: 0010:csd_lock_wait kernel/smp.c:108 [inline] RIP: 0010:smp_call_function_single+0x185/0x370 kernel/smp.c:302 RSP: 0018:ffff888074ccfa40 EFLAGS: 00000297 RAX: 0000000000000003 RBX: 1ffff1100e999f4c RCX: 1ffff11013816d71 RDX: 0000000000000000 RSI: ffff88809c0b6b68 RDI: 0000000000000286 RBP: ffff888074ccfaf0 R08: 0000000000000001 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000001 FS: 0000000000000000(0000) GS:ffff8880ba500000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000055a0cbf20ad8 CR3: 00000000a4308000 CR4: 00000000003406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: smp_call_function_many+0x60f/0x7a0 kernel/smp.c:434 smp_call_function kernel/smp.c:492 [inline] on_each_cpu+0x40/0x210 kernel/smp.c:602 text_poke_bp+0x90/0x110 arch/x86/kernel/alternative.c:796 __jump_label_transform+0x269/0x300 arch/x86/kernel/jump_label.c:102 arch_jump_label_transform+0x26/0x40 arch/x86/kernel/jump_label.c:110 __jump_label_update+0x113/0x170 kernel/jump_label.c:374 jump_label_update kernel/jump_label.c:741 [inline] jump_label_update+0x140/0x2d0 kernel/jump_label.c:720 static_key_enable_cpuslocked+0xf9/0x170 kernel/jump_label.c:141 static_key_enable+0x16/0x20 kernel/jump_label.c:154 netstamp_clear+0x2e/0x50 net/core/dev.c:1752 process_one_work+0x793/0x14a0 kernel/workqueue.c:2117 worker_thread+0x5cc/0xff0 kernel/workqueue.c:2251 kthread+0x30d/0x420 kernel/kthread.c:232 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:404 Code: 8b 54 24 10 4c 89 e9 8b 7c 24 1c 48 8d 74 24 40 e8 71 fa ff ff 41 89 c4 8b 44 24 58 a8 01 74 0f e8 51 c9 08 00 f3 90 8b 44 24 58 01 75 f1 e8 42 c9 08 00 e8 3d c9 08 00 bf 01 00 00 00 e8 23 ---------------- Code disassembly (best guess): 0: 57 push %rdi 1: 49 89 ff mov %rdi,%r15 4: 41 56 push %r14 6: 41 55 push %r13 8: 41 54 push %r12 a: 55 push %rbp b: 53 push %rbx c: 48 83 ec 78 sub $0x78,%rsp 10: 48 c7 44 24 38 b3 8a movq $0x41b58ab3,0x38(%rsp) 17: b5 41 19: 48 8d 5c 24 38 lea 0x38(%rsp),%rbx 1e: 48 c7 44 24 40 11 54 movq $0xffffffff88b55411,0x40(%rsp) 25: b5 88 27: 48 c1 eb 03 shr $0x3,%rbx * 2b: 48 c7 44 24 48 80 6f movq $0xffffffff81236f80,0x48(%rsp) <-- trapping instruction 32: 23 81 34: 48 8d 14 03 lea (%rbx,%rax,1),%rdx 38: c7 02 f1 f1 f1 f1 movl $0xf1f1f1f1,(%rdx) 3e: c7 .byte 0xc7 3f: 42 rex.X