sd 0:0:1:0: [sg0] tag#7972 CDB: opcode=0xe5 (vendor) sd 0:0:1:0: [sg0] tag#7972 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c sd 0:0:1:0: [sg0] tag#7972 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d sd 0:0:1:0: [sg0] tag#7972 CDB[20]: ba watchdog: BUG: soft lockup - CPU#0 stuck for 23s! [syz-executor.0:9687] Modules linked in: kauditd_printk_skb: 6 callbacks suppressed audit: type=1804 audit(1648054613.810:18): pid=9703 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir377312343/syzkaller.yqkW0h/7/bus" dev="sda1" ino=13969 res=1 irq event stamp: 4540405 hardirqs last enabled at (4540404): [] restore_regs_and_return_to_kernel+0x0/0x2a hardirqs last disabled at (4540405): [] apic_timer_interrupt+0x8e/0xa0 arch/x86/entry/entry_64.S:793 softirqs last enabled at (15386): [] __do_softirq+0x68b/0x9ff kernel/softirq.c:314 softirqs last disabled at (16299): [] invoke_softirq kernel/softirq.c:368 [inline] softirqs last disabled at (16299): [] irq_exit+0x193/0x240 kernel/softirq.c:409 CPU: 0 PID: 9687 Comm: syz-executor.0 Not tainted 4.14.273-syzkaller #0 audit: type=1800 audit(1648054613.820:19): pid=9703 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="bus" dev="sda1" ino=13969 res=0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 task: ffff888051f580c0 task.stack: ffff888051f60000 RIP: 0010:orc_find arch/x86/kernel/unwind_orc.c:109 [inline] RIP: 0010:unwind_next_frame+0x4fa/0x17d0 arch/x86/kernel/unwind_orc.c:348 RSP: 0018:ffff8880ba407438 EFLAGS: 00000a06 ORIG_RAX: ffffffffffffff10 RAX: 0000000000000007 RBX: 1ffff11017480e8e RCX: ffffffff81896d69 RDX: dffffc0000000000 RSI: 000000000000896d RDI: ffffffff8ae941c8 RBP: 0000000000000001 R08: 000000000000896e R09: 0000000000000000 R10: 00000000000211cd R11: 0000000000066071 R12: ffff8880ba40752d R13: ffff8880ba407530 R14: ffff8880ba407548 R15: ffff8880ba4074f8 FS: 00007f5ef9d5e700(0000) GS:ffff8880ba400000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f8e4c3cf718 CR3: 00000000aac7f000 CR4: 00000000003406f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: unregister_netdevice: waiting for ip6gre0 to become free. Usage count = -1 __save_stack_trace+0x90/0x160 arch/x86/kernel/stacktrace.c:44 save_stack mm/kasan/kasan.c:447 [inline] set_track mm/kasan/kasan.c:459 [inline] kasan_kmalloc+0xeb/0x160 mm/kasan/kasan.c:551 audit: type=1804 audit(1648054613.970:20): pid=9705 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir1239264500/syzkaller.4xhDsn/10/bus" dev="sda1" ino=13959 res=1 audit: type=1800 audit(1648054613.980:21): pid=9705 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed(directio)" comm="syz-executor.3" name="bus" dev="sda1" ino=13959 res=0 sd 0:0:1:0: [sg0] tag#7986 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK __do_kmalloc mm/slab.c:3720 [inline] __kmalloc+0x15a/0x400 mm/slab.c:3729 sd 0:0:1:0: [sg0] tag#7986 CDB: opcode=0xe5 (vendor) kmalloc include/linux/slab.h:493 [inline] kzalloc include/linux/slab.h:661 [inline] neigh_alloc net/core/neighbour.c:324 [inline] __neigh_create+0x1db/0x19b0 net/core/neighbour.c:499 ip6_finish_output2+0x802/0x1f10 net/ipv6/ip6_output.c:117 ip6_finish_output+0x5c6/0xd50 net/ipv6/ip6_output.c:192 NF_HOOK_COND include/linux/netfilter.h:239 [inline] ip6_output+0x1c5/0x660 net/ipv6/ip6_output.c:209 dst_output include/net/dst.h:470 [inline] NF_HOOK include/linux/netfilter.h:250 [inline] ndisc_send_skb+0x82a/0x1390 net/ipv6/ndisc.c:483 ndisc_send_rs+0x125/0x630 net/ipv6/ndisc.c:677 addrconf_rs_timer+0x2bb/0x5a0 net/ipv6/addrconf.c:3769 call_timer_fn+0x14a/0x650 kernel/time/timer.c:1280 expire_timers+0x232/0x4d0 kernel/time/timer.c:1319 __run_timers kernel/time/timer.c:1637 [inline] run_timer_softirq+0x1d5/0x5a0 kernel/time/timer.c:1650 __do_softirq+0x24d/0x9ff kernel/softirq.c:288 invoke_softirq kernel/softirq.c:368 [inline] irq_exit+0x193/0x240 kernel/softirq.c:409 exiting_irq arch/x86/include/asm/apic.h:638 [inline] smp_apic_timer_interrupt+0x141/0x5e0 arch/x86/kernel/apic/apic.c:1106 apic_timer_interrupt+0x93/0xa0 arch/x86/entry/entry_64.S:793 RIP: 0010:preempt_schedule_irq+0xa6/0x140 kernel/sched/core.c:3614 RSP: 0018:ffff888051f67430 EFLAGS: 00000282 sd 0:0:1:0: [sg0] tag#7986 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c ORIG_RAX: ffffffffffffff10 RAX: 1ffffffff11e12f3 RBX: dffffc0000000000 RCX: 1ffff1100a3eb132 RDX: 0000000000000000 RSI: ffff888051f58970 RDI: ffff888051f58944 RBP: ffffed100a3eb018 R08: ffff88823fff7018 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: ffff888051f580c0 R13: ffffffff88f09798 R14: 0000000000000000 R15: 0000000000000000 retint_kernel+0x1b/0x2d RIP: 0010:__find_get_block+0x20d/0xc40 fs/buffer.c:1355 RSP: 0018:ffff888051f67500 EFLAGS: 00000212 ORIG_RAX: ffffffffffffff10 RAX: 0000000000040000 RBX: 0000000000000000 RCX: ffffc90005bb2000 RDX: 0000000000010963 RSI: ffffffff8192ef96 RDI: ffff888051f58944 RBP: 0000000000000000 R08: 0000000000000222 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: ffff8880590c1540 R13: ffffffff88f09798 R14: 000000000000038a R15: ffff8880590c1540 __getblk_gfp+0x28/0x70 fs/buffer.c:1379 sb_getblk include/linux/buffer_head.h:333 [inline] __ext4_get_inode_loc+0x32b/0xf30 fs/ext4/inode.c:4528 ext4_get_inode_loc fs/ext4/inode.c:4641 [inline] ext4_reserve_inode_write+0xd9/0x230 fs/ext4/inode.c:5802 ext4_mark_inode_dirty+0x12f/0x7a0 fs/ext4/inode.c:5969 ext4_ext_tree_init+0x13a/0x170 fs/ext4/extents.c:874 __ext4_new_inode+0x4030/0x4eb0 fs/ext4/ialloc.c:1179 sd 0:0:1:0: [sg0] tag#7986 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d sd 0:0:1:0: [sg0] tag#7986 CDB[20]: ba ext4_create+0x244/0x520 fs/ext4/namei.c:2495 lookup_open+0x77a/0x1750 fs/namei.c:3241 do_last fs/namei.c:3334 [inline] path_openat+0xe08/0x2970 fs/namei.c:3569 do_filp_open+0x179/0x3c0 fs/namei.c:3603 audit: type=1804 audit(1648054614.390:22): pid=9726 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir2874028288/syzkaller.T64kuc/10/bus" dev="sda1" ino=13977 res=1 do_sys_open+0x296/0x410 fs/open.c:1081 audit: type=1800 audit(1648054614.390:23): pid=9726 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="bus" dev="sda1" ino=13977 res=0 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x7f5efb3e9049 RSP: 002b:00007f5ef9d5e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 RAX: ffffffffffffffda RBX: 00007f5efb4fbf60 RCX: 00007f5efb3e9049 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000040 RBP: 00007f5efb44308d R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007fff3cf95b5f R14: 00007f5ef9d5e300 R15: 0000000000022000 Code: 10 44 8d 46 01 44 8b 14 95 10 1c e7 8a 48 ba 00 00 00 00 00 fc ff df 4a 8d 3c 85 10 1c e7 8a 49 89 f9 49 c1 e9 03 45 0f b6 0c 11 <48> 89 fa 83 e2 07 83 c2 03 44 38 ca 7c 3c 45 84 c9 74 37 4c 89 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 PID: 9705 Comm: syz-executor.3 Not tainted 4.14.273-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 task: ffff8880a363e500 task.stack: ffff888091160000 RIP: 0010:lock_release+0x435/0x870 kernel/locking/lockdep.c:4021 RSP: 0018:ffff888091167708 EFLAGS: 00000286 RAX: dffffc0000000000 RBX: 1ffff1101222cee4 RCX: 1ffff110146c7db6 RDX: dffffc0000000000 RSI: 0000000000000002 RDI: 0000000000000286 RBP: ffff8880a363e500 R08: 0000000000000000 R09: 0000000000000001 R10: 0000000000000000 R11: ffff8880a363e500 R12: 5a6fd2f7be4312d3 R13: 0000000000000003 R14: ffff8880a363e500 R15: 0000000000000002 FS: 00007f7bb7675700(0000) GS:ffff8880ba500000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000001b2e534000 CR3: 000000009f370000 CR4: 00000000003406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: page_remove_rmap+0x96/0xe0 mm/rmap.c:1293 zap_pte_range mm/memory.c:1364 [inline] zap_pmd_range mm/memory.c:1466 [inline] zap_pud_range mm/memory.c:1495 [inline] zap_p4d_range mm/memory.c:1516 [inline] unmap_page_range+0xf3f/0x1ce0 mm/memory.c:1537 unmap_single_vma+0x147/0x2b0 mm/memory.c:1582 unmap_vmas+0x9d/0x160 mm/memory.c:1612 exit_mmap+0x270/0x4d0 mm/mmap.c:3058 __mmput kernel/fork.c:931 [inline] mmput kernel/fork.c:952 [inline] mmput+0xfa/0x420 kernel/fork.c:947 exit_mm kernel/exit.c:548 [inline] do_exit+0x984/0x2850 kernel/exit.c:855 do_group_exit+0x100/0x2e0 kernel/exit.c:965 get_signal+0x38d/0x1ca0 kernel/signal.c:2412 do_signal+0x7c/0x1550 arch/x86/kernel/signal.c:792 exit_to_usermode_loop+0x160/0x200 arch/x86/entry/common.c:160 prepare_exit_to_usermode arch/x86/entry/common.c:199 [inline] syscall_return_slowpath arch/x86/entry/common.c:270 [inline] do_syscall_64+0x4a3/0x640 arch/x86/entry/common.c:297 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x7f7bb8d00049 RSP: 002b:00007f7bb7675218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca RAX: fffffffffffffe00 RBX: 00007f7bb8e12f68 RCX: 00007f7bb8d00049 RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f7bb8e12f68 RBP: 00007f7bb8e12f60 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7bb8e12f6c R13: 00007fffb239352f R14: 00007f7bb7675300 R15: 0000000000022000 Code: 48 83 3d 36 c6 ae 07 00 0f 84 ba 01 00 00 48 8b 3c 24 57 9d 0f 1f 44 00 00 48 b8 00 00 00 00 00 fc ff df 48 c7 04 03 00 00 00 00 <48> 83 c4 58 5b 5d 41 5c 41 5d 41 5e 41 5f c3 65 8b 05 a5 4f c0 ---------------- Code disassembly (best guess), 1 bytes skipped: 0: 44 8d 46 01 lea 0x1(%rsi),%r8d 4: 44 8b 14 95 10 1c e7 mov -0x7518e3f0(,%rdx,4),%r10d b: 8a c: 48 ba 00 00 00 00 00 movabs $0xdffffc0000000000,%rdx 13: fc ff df 16: 4a 8d 3c 85 10 1c e7 lea -0x7518e3f0(,%r8,4),%rdi 1d: 8a 1e: 49 89 f9 mov %rdi,%r9 21: 49 c1 e9 03 shr $0x3,%r9 25: 45 0f b6 0c 11 movzbl (%r9,%rdx,1),%r9d * 2a: 48 89 fa mov %rdi,%rdx <-- trapping instruction 2d: 83 e2 07 and $0x7,%edx 30: 83 c2 03 add $0x3,%edx 33: 44 38 ca cmp %r9b,%dl 36: 7c 3c jl 0x74 38: 45 84 c9 test %r9b,%r9b 3b: 74 37 je 0x74 3d: 4c rex.WR 3e: 89 .byte 0x89