watchdog: BUG: soft lockup - CPU#1 stuck for 23s! [ksoftirqd/1:17] Modules linked in: irq event stamp: 4089743 hardirqs last enabled at (4089742): [] slab_alloc_node mm/slab.c:3327 [inline] hardirqs last enabled at (4089742): [] kmem_cache_alloc_node+0x2f8/0x410 mm/slab.c:3640 hardirqs last disabled at (4089743): [] apic_timer_interrupt+0x8e/0xa0 arch/x86/entry/entry_64.S:793 softirqs last enabled at (1937466): [] __do_softirq+0x68b/0x9ff kernel/softirq.c:314 softirqs last disabled at (1937471): [] run_ksoftirqd+0x50/0x1a0 kernel/softirq.c:670 CPU: 1 PID: 17 Comm: ksoftirqd/1 Not tainted 4.14.280-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 task: ffff8880b54b4480 task.stack: ffff8880b54b8000 RIP: 0010:save_stack_address arch/x86/kernel/stacktrace.c:26 [inline] RIP: 0010:save_stack_address arch/x86/kernel/stacktrace.c:15 [inline] RIP: 0010:__save_stack_trace+0x6c/0x160 arch/x86/kernel/stacktrace.c:46 RSP: 0018:ffff8880b54be5e8 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff10 RAX: 0000000000000000 RBX: ffffffff860ed3ab RCX: 0000000000000000 RDX: 1ffff11016a97cc8 RSI: ffff8880b54be4e8 RDI: ffffffff860ed3ab RBP: ffff8880b54be668 R08: 0000000000000001 R09: 0000000000000001 R10: ffff8880b54bf238 R11: 0000000000000001 R12: ffff8880b54be680 R13: 0000000000000000 R14: ffff88823a817240 R15: 00000000000000e8 FS: 0000000000000000(0000) GS:ffff8880ba500000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000001b30829000 CR3: 0000000008e6a000 CR4: 00000000003406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: save_stack mm/kasan/kasan.c:447 [inline] set_track mm/kasan/kasan.c:459 [inline] kasan_kmalloc+0xeb/0x160 mm/kasan/kasan.c:551 kmem_cache_alloc_node+0x146/0x410 mm/slab.c:3642 __alloc_skb+0x5c/0x510 net/core/skbuff.c:193 skb_segment+0x677/0x2e60 net/core/skbuff.c:3683 sctp_gso_segment net/sctp/offload.c:76 [inline] sctp_gso_segment+0x204/0x810 net/sctp/offload.c:43 inet_gso_segment+0x487/0x10f0 net/ipv4/af_inet.c:1272 inet_gso_segment+0x487/0x10f0 net/ipv4/af_inet.c:1272 skb_mac_gso_segment+0x240/0x4c0 net/core/dev.c:2745 __skb_gso_segment+0x302/0x600 net/core/dev.c:2818 skb_gso_segment include/linux/netdevice.h:4005 [inline] validate_xmit_skb+0x49c/0x9f0 net/core/dev.c:3071 validate_xmit_skb_list+0xaf/0x110 net/core/dev.c:3122 sch_direct_xmit+0x2dc/0x500 net/sched/sch_generic.c:181 qdisc_restart net/sched/sch_generic.c:249 [inline] __qdisc_run+0x25d/0xe00 net/sched/sch_generic.c:257 __dev_xmit_skb net/core/dev.c:3231 [inline] __dev_queue_xmit+0x13ac/0x2480 net/core/dev.c:3489 neigh_hh_output include/net/neighbour.h:490 [inline] neigh_output include/net/neighbour.h:498 [inline] ip_finish_output2+0x9db/0x1340 net/ipv4/ip_output.c:237 ip_finish_output+0x37c/0xc50 net/ipv4/ip_output.c:325 NF_HOOK_COND include/linux/netfilter.h:239 [inline] ip_output+0x1cd/0x510 net/ipv4/ip_output.c:413 dst_output include/net/dst.h:470 [inline] ip_local_out+0x93/0x170 net/ipv4/ip_output.c:125 ip_send_skb net/ipv4/ip_output.c:1431 [inline] ip_push_pending_frames+0x8b/0x120 net/ipv4/ip_output.c:1451 icmp_push_reply+0x384/0x4f0 net/ipv4/icmp.c:398 __icmp_send+0xf28/0x1240 net/ipv4/icmp.c:772 icmp_send include/net/icmp.h:47 [inline] ip_fragment.constprop.0+0x1b2/0x200 net/ipv4/ip_output.c:564 ip_finish_output+0x89e/0xc50 net/ipv4/ip_output.c:323 NF_HOOK_COND include/linux/netfilter.h:239 [inline] ip_output+0x1cd/0x510 net/ipv4/ip_output.c:413 dst_output include/net/dst.h:470 [inline] ip_local_out+0x93/0x170 net/ipv4/ip_output.c:125 nf_dup_ipv4 net/ipv4/netfilter/nf_dup_ipv4.c:91 [inline] nf_dup_ipv4+0x4bb/0x680 net/ipv4/netfilter/nf_dup_ipv4.c:53 tee_tg4+0x109/0x160 net/netfilter/xt_TEE.c:36 ipt_do_table+0xa9d/0x16f0 net/ipv4/netfilter/ip_tables.c:353 iptable_filter_hook+0x172/0x1e0 net/ipv4/netfilter/iptable_filter.c:47 nf_hook_entry_hookfn include/linux/netfilter.h:108 [inline] nf_hook_slow+0xb0/0x1a0 net/netfilter/core.c:468 nf_hook include/linux/netfilter.h:205 [inline] NF_HOOK include/linux/netfilter.h:248 [inline] ip_local_deliver+0x28c/0x460 net/ipv4/ip_input.c:257 dst_input include/net/dst.h:476 [inline] ip_rcv_finish+0x6e3/0x19f0 net/ipv4/ip_input.c:396 NF_HOOK include/linux/netfilter.h:250 [inline] ip_rcv+0x8a7/0xf10 net/ipv4/ip_input.c:493 __netif_receive_skb_core+0x15ee/0x2a30 net/core/dev.c:4474 __netif_receive_skb+0x27/0x1a0 net/core/dev.c:4512 process_backlog+0x218/0x6f0 net/core/dev.c:5195 napi_poll net/core/dev.c:5604 [inline] net_rx_action+0x466/0xfd0 net/core/dev.c:5670 __do_softirq+0x24d/0x9ff kernel/softirq.c:288 run_ksoftirqd+0x50/0x1a0 kernel/softirq.c:670 smpboot_thread_fn+0x5c1/0x920 kernel/smpboot.c:164 kthread+0x30d/0x420 kernel/kthread.c:232 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:404 Code: 73 10 49 8b 4c 24 08 8d 78 01 41 89 3c 24 48 89 1c c1 48 8b 8a 98 00 00 00 48 8d 7d 90 e8 fd d2 05 00 8b 55 90 85 d2 75 2d eb 62 <41> 8b 04 24 41 3b 44 24 04 73 76 49 8b 54 24 08 8d 48 01 41 89 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 PID: 7 Comm: ksoftirqd/0 Not tainted 4.14.280-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 task: ffff8880b540a1c0 task.stack: ffff8880b5418000 RIP: 0010:orc_find arch/x86/kernel/unwind_orc.c:109 [inline] RIP: 0010:unwind_next_frame+0x4f5/0x17d0 arch/x86/kernel/unwind_orc.c:348 RSP: 0018:ffff8880b541f4f0 EFLAGS: 00000802 RAX: 0000000000000007 RBX: 1ffff11016a83ea5 RCX: ffffffff81383b50 RDX: dffffc0000000000 RSI: 000000000000383b RDI: ffffffff8ae80990 RBP: 0000000000000001 R08: 000000000000383c R09: 1ffffffff15d0132 R10: 000000000000c5dc R11: 0000000000066071 R12: ffff8880b541f5e5 R13: ffff8880b541f5e8 R14: ffff8880b541f600 R15: ffff8880b541f5b0 FS: 0000000000000000(0000) GS:ffff8880ba400000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000563903434b08 CR3: 000000009f1b8000 CR4: 00000000003406f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: __save_stack_trace+0x90/0x160 arch/x86/kernel/stacktrace.c:44 save_stack mm/kasan/kasan.c:447 [inline] set_track mm/kasan/kasan.c:459 [inline] kasan_slab_free+0xc3/0x1a0 mm/kasan/kasan.c:524 __cache_free mm/slab.c:3496 [inline] kfree+0xc9/0x250 mm/slab.c:3815 skb_free_head net/core/skbuff.c:563 [inline] skb_release_data+0x5f6/0x820 net/core/skbuff.c:583 skb_release_all net/core/skbuff.c:640 [inline] __kfree_skb net/core/skbuff.c:654 [inline] kfree_skb+0xe7/0x390 net/core/skbuff.c:672 ip_rcv_finish+0x10b1/0x19f0 net/ipv4/ip_input.c:399 NF_HOOK include/linux/netfilter.h:250 [inline] ip_rcv+0x8a7/0xf10 net/ipv4/ip_input.c:493 __netif_receive_skb_core+0x15ee/0x2a30 net/core/dev.c:4474 __netif_receive_skb+0x27/0x1a0 net/core/dev.c:4512 netif_receive_skb_internal+0xd7/0x580 net/core/dev.c:4585 napi_skb_finish net/core/dev.c:4947 [inline] napi_gro_receive+0x2e2/0x400 net/core/dev.c:4978 gro_cell_poll+0x119/0x1d0 net/core/gro_cells.c:60 napi_poll net/core/dev.c:5604 [inline] net_rx_action+0x466/0xfd0 net/core/dev.c:5670 __do_softirq+0x24d/0x9ff kernel/softirq.c:288 run_ksoftirqd+0x50/0x1a0 kernel/softirq.c:670 smpboot_thread_fn+0x5c1/0x920 kernel/smpboot.c:164 kthread+0x30d/0x420 kernel/kthread.c:232 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:404 Code: 18 48 8b 4c 24 10 44 8d 46 01 44 8b 14 95 a0 28 e7 8a 48 ba 00 00 00 00 00 fc ff df 4a 8d 3c 85 a0 28 e7 8a 49 89 f9 49 c1 e9 03 <45> 0f b6 0c 11 48 89 fa 83 e2 07 83 c2 03 44 38 ca 7c 3c 45 84 ---------------- Code disassembly (best guess): 0: 73 10 jae 0x12 2: 49 8b 4c 24 08 mov 0x8(%r12),%rcx 7: 8d 78 01 lea 0x1(%rax),%edi a: 41 89 3c 24 mov %edi,(%r12) e: 48 89 1c c1 mov %rbx,(%rcx,%rax,8) 12: 48 8b 8a 98 00 00 00 mov 0x98(%rdx),%rcx 19: 48 8d 7d 90 lea -0x70(%rbp),%rdi 1d: e8 fd d2 05 00 callq 0x5d31f 22: 8b 55 90 mov -0x70(%rbp),%edx 25: 85 d2 test %edx,%edx 27: 75 2d jne 0x56 29: eb 62 jmp 0x8d * 2b: 41 8b 04 24 mov (%r12),%eax <-- trapping instruction 2f: 41 3b 44 24 04 cmp 0x4(%r12),%eax 34: 73 76 jae 0xac 36: 49 8b 54 24 08 mov 0x8(%r12),%rdx 3b: 8d 48 01 lea 0x1(%rax),%ecx 3e: 41 rex.B 3f: 89 .byte 0x89