audit: type=1800 audit(1648689615.990:4): pid=9519 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="loop1" ino=17 res=0 audit: type=1804 audit(1648689616.000:5): pid=9519 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="ToMToU" comm="syz-executor.1" name="/root/syzkaller-testdir2606838666/syzkaller.mkbx7D/4/file0/file0" dev="loop1" ino=17 res=1 watchdog: BUG: soft lockup - CPU#0 stuck for 22s! [syz-executor.4:9493] Modules linked in: irq event stamp: 4446269 hardirqs last enabled at (4446268): [] restore_regs_and_return_to_kernel+0x0/0x2a hardirqs last disabled at (4446269): [] apic_timer_interrupt+0x8e/0xa0 arch/x86/entry/entry_64.S:793 softirqs last enabled at (56666): [] __do_softirq+0x68b/0x9ff kernel/softirq.c:314 softirqs last disabled at (57413): [] invoke_softirq kernel/softirq.c:368 [inline] softirqs last disabled at (57413): [] irq_exit+0x193/0x240 kernel/softirq.c:409 CPU: 0 PID: 9493 Comm: syz-executor.4 Not tainted 4.14.274-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 task: ffff888058c0a4c0 task.stack: ffff888058c10000 RIP: 0010:__save_stack_trace+0x93/0x160 arch/x86/kernel/stacktrace.c:43 RSP: 0018:ffff8880ba407908 EFLAGS: 00000292 ORIG_RAX: ffffffffffffff10 RAX: 0000000000000001 RBX: ffffffff816c8b8a RCX: 0000000000000000 RDX: dffffc0000000000 RSI: ffff8880ba407808 RDI: 0000000000000001 RBP: ffff8880ba407988 R08: 0000000000000001 R09: 0000000000000001 R10: ffff888058c177c0 R11: 0000000000000001 R12: ffff8880ba4079a0 R13: 0000000000000000 R14: ffff88813fe74940 R15: 00000000000001c0 FS: 0000000000000000(0000) GS:ffff8880ba400000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000001b2d92f000 CR3: 000000009bcdf000 CR4: 00000000003406f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: save_stack mm/kasan/kasan.c:447 [inline] set_track mm/kasan/kasan.c:459 [inline] kasan_kmalloc+0xeb/0x160 mm/kasan/kasan.c:551 __do_kmalloc_node mm/slab.c:3682 [inline] __kmalloc_node_track_caller+0x4c/0x70 mm/slab.c:3696 __kmalloc_reserve net/core/skbuff.c:137 [inline] __alloc_skb+0x96/0x510 net/core/skbuff.c:205 alloc_skb include/linux/skbuff.h:980 [inline] ndisc_alloc_skb+0x134/0x310 net/ipv6/ndisc.c:402 ndisc_send_rs+0x2ec/0x630 net/ipv6/ndisc.c:661 addrconf_rs_timer+0x2bb/0x5a0 net/ipv6/addrconf.c:3769 call_timer_fn+0x14a/0x650 kernel/time/timer.c:1280 expire_timers+0x232/0x4d0 kernel/time/timer.c:1319 __run_timers kernel/time/timer.c:1637 [inline] run_timer_softirq+0x1d5/0x5a0 kernel/time/timer.c:1650 __do_softirq+0x24d/0x9ff kernel/softirq.c:288 invoke_softirq kernel/softirq.c:368 [inline] irq_exit+0x193/0x240 kernel/softirq.c:409 exiting_irq arch/x86/include/asm/apic.h:638 [inline] smp_apic_timer_interrupt+0x141/0x5e0 arch/x86/kernel/apic/apic.c:1106 apic_timer_interrupt+0x93/0xa0 arch/x86/entry/entry_64.S:793 RIP: 0010:mark_page_accessed+0x22a/0x530 mm/swap.c:398 RSP: 0018:ffff888058c17790 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff10 RAX: 00fff0000004003c RBX: ffffea000179a240 RCX: ffff888058c179d0 RDX: 1ffffd40002f3448 RSI: ffff888058c179d0 RDI: ffffea000179a240 RBP: ffffea000179a240 R08: ffff88823b320cd0 R09: 0000000000000001 R10: 0000000000000000 R11: ffff888058c0a4c0 R12: ffffea000179aa20 R13: ffffea000179aa20 R14: 0000001b2d925000 R15: 0000000000000020 zap_pte_range mm/memory.c:1361 [inline] zap_pmd_range mm/memory.c:1466 [inline] zap_pud_range mm/memory.c:1495 [inline] zap_p4d_range mm/memory.c:1516 [inline] unmap_page_range+0xe5c/0x1ce0 mm/memory.c:1537 unmap_single_vma+0x147/0x2b0 mm/memory.c:1582 unmap_vmas+0x9d/0x160 mm/memory.c:1612 exit_mmap+0x270/0x4d0 mm/mmap.c:3058 __mmput kernel/fork.c:931 [inline] mmput kernel/fork.c:952 [inline] mmput+0xfa/0x420 kernel/fork.c:947 exit_mm kernel/exit.c:548 [inline] do_exit+0x984/0x2850 kernel/exit.c:855 do_group_exit+0x100/0x2e0 kernel/exit.c:965 get_signal+0x38d/0x1ca0 kernel/signal.c:2412 do_signal+0x7c/0x1550 arch/x86/kernel/signal.c:792 exit_to_usermode_loop+0x160/0x200 arch/x86/entry/common.c:160 prepare_exit_to_usermode arch/x86/entry/common.c:199 [inline] syscall_return_slowpath arch/x86/entry/common.c:270 [inline] do_syscall_64+0x4a3/0x640 arch/x86/entry/common.c:297 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x7f92943eb049 RSP: 002b:00007f9292d60218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca RAX: fffffffffffffe00 RBX: 00007f92944fdf68 RCX: 00007f92943eb049 RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f92944fdf68 RBP: 00007f92944fdf60 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f92944fdf6c R13: 00007ffd347b98df R14: 00007f9292d60300 R15: 0000000000022000 Code: 75 2d eb 62 41 8b 04 24 41 3b 44 24 04 73 76 49 8b 54 24 08 8d 48 01 41 89 0c 24 48 89 1c c2 48 8d 7d 90 e8 f0 bc 05 00 8b 45 90 <85> c0 74 37 48 8d 7d 90 e8 a0 ba 05 00 48 85 c0 48 89 c3 74 26 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 skipped: idling at pc 0xffffffff8724315e ---------------- Code disassembly (best guess): 0: 75 2d jne 0x2f 2: eb 62 jmp 0x66 4: 41 8b 04 24 mov (%r12),%eax 8: 41 3b 44 24 04 cmp 0x4(%r12),%eax d: 73 76 jae 0x85 f: 49 8b 54 24 08 mov 0x8(%r12),%rdx 14: 8d 48 01 lea 0x1(%rax),%ecx 17: 41 89 0c 24 mov %ecx,(%r12) 1b: 48 89 1c c2 mov %rbx,(%rdx,%rax,8) 1f: 48 8d 7d 90 lea -0x70(%rbp),%rdi 23: e8 f0 bc 05 00 callq 0x5bd18 28: 8b 45 90 mov -0x70(%rbp),%eax * 2b: 85 c0 test %eax,%eax <-- trapping instruction 2d: 74 37 je 0x66 2f: 48 8d 7d 90 lea -0x70(%rbp),%rdi 33: e8 a0 ba 05 00 callq 0x5bad8 38: 48 85 c0 test %rax,%rax 3b: 48 89 c3 mov %rax,%rbx 3e: 74 26 je 0x66