watchdog: BUG: soft lockup - CPU#1 stuck for 22s! [syz-executor.3:2927] Modules linked in: irq event stamp: 3165423 hardirqs last enabled at (3165422): [] trace_hardirqs_on_thunk+0x1a/0x1c hardirqs last disabled at (3165423): [] trace_hardirqs_off_thunk+0x1a/0x1c softirqs last enabled at (1077518): [] __do_softirq+0x678/0x980 kernel/softirq.c:318 softirqs last disabled at (1077521): [] invoke_softirq kernel/softirq.c:372 [inline] softirqs last disabled at (1077521): [] irq_exit+0x215/0x260 kernel/softirq.c:412 CPU: 1 PID: 2927 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:unwind_next_frame+0x534/0x1400 arch/x86/kernel/unwind_orc.c:435 Code: 48 89 4c 24 20 48 c1 ef 03 0f b6 14 17 4c 89 c7 83 e7 07 40 38 fe 40 0f 9e c7 40 84 f6 40 0f 95 c6 40 84 f7 0f 85 a8 0b 00 00 <48> 89 ce 83 e6 07 40 38 f2 40 0f 9e c6 84 d2 0f 95 c2 40 84 d6 0f RSP: 0018:ffff8880ba1076a8 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 RAX: 0000000000000014 RBX: 1ffff11017420ede RCX: ffffffff8b8fd645 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000001 RBP: 0000000000000002 R08: ffffffff8b8fd644 R09: ffffffff8b8fd628 R10: ffff8880ba1078ef R11: 0000000000074071 R12: ffff8880ba1078d8 R13: ffff8880ba1078c5 R14: ffff8880ba107890 R15: ffffffff8b8fd640 FS: 00007ff94b5d0700(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007ff94cd6e028 CR3: 000000004716e000 CR4: 00000000003406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: __unwind_start+0x5b8/0x960 arch/x86/kernel/unwind_orc.c:667 unwind_start arch/x86/include/asm/unwind.h:60 [inline] __save_stack_trace+0x72/0x190 arch/x86/kernel/stacktrace.c:43 save_stack mm/kasan/kasan.c:448 [inline] set_track mm/kasan/kasan.c:460 [inline] kasan_kmalloc+0xeb/0x160 mm/kasan/kasan.c:553 kmem_cache_alloc_node_trace+0x151/0x3b0 mm/slab.c:3668 __do_kmalloc_node mm/slab.c:3688 [inline] __kmalloc_node_track_caller+0x38/0x70 mm/slab.c:3703 __kmalloc_reserve net/core/skbuff.c:137 [inline] __alloc_skb+0xae/0x560 net/core/skbuff.c:205 alloc_skb include/linux/skbuff.h:995 [inline] mrp_pdu_init net/802/mrp.c:316 [inline] mrp_pdu_append_vecattr_event+0x7d2/0x1050 net/802/mrp.c:415 mrp_attr_event+0x15d/0x220 net/802/mrp.c:510 mrp_mad_event net/802/mrp.c:590 [inline] mrp_join_timer+0x5a/0xc0 net/802/mrp.c:607 call_timer_fn+0x177/0x700 kernel/time/timer.c:1338 expire_timers+0x243/0x4e0 kernel/time/timer.c:1375 __run_timers kernel/time/timer.c:1696 [inline] run_timer_softirq+0x21c/0x670 kernel/time/timer.c:1709 __do_softirq+0x265/0x980 kernel/softirq.c:292 invoke_softirq kernel/softirq.c:372 [inline] irq_exit+0x215/0x260 kernel/softirq.c:412 exiting_irq arch/x86/include/asm/apic.h:536 [inline] smp_apic_timer_interrupt+0x136/0x550 arch/x86/kernel/apic/apic.c:1098 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:894 RIP: 0010:__write_once_size include/linux/compiler.h:290 [inline] RIP: 0010:__sanitizer_cov_trace_pc+0x44/0x50 kernel/kcov.c:109 Code: 75 2b 8b 90 60 13 00 00 83 fa 02 75 20 48 8b 88 68 13 00 00 8b 80 64 13 00 00 48 8b 11 48 83 c2 01 48 39 d0 76 07 48 89 34 d1 <48> 89 11 c3 0f 1f 84 00 00 00 00 00 49 89 f1 49 89 fa 65 48 8b 34 RSP: 0018:ffff8880399775b0 EFLAGS: 00000216 ORIG_RAX: ffffffffffffff13 RAX: 0000000000040000 RBX: 0000000000000001 RCX: ffffc9000852a000 RDX: 0000000000010625 RSI: ffffffff8192a713 RDI: 0000000000000005 RBP: ffffea000180fb30 R08: 0000000000000000 R09: 0000000000000200 R10: 0000000000000005 R11: 0000000000000000 R12: 00000000000001ec R13: 00000000000001ec R14: 0000000000000000 R15: 0000000000000001 page_trans_huge_map_swapcount mm/swapfile.c:1511 [inline] reuse_swap_page+0xbf3/0x1410 mm/swapfile.c:1552 do_wp_page+0x41d/0x2210 mm/memory.c:2876 handle_pte_fault mm/memory.c:4191 [inline] __handle_mm_fault+0x258b/0x41c0 mm/memory.c:4299 handle_mm_fault+0x436/0xb10 mm/memory.c:4336 faultin_page mm/gup.c:539 [inline] __get_user_pages+0x6f0/0x1710 mm/gup.c:745 __get_user_pages_locked mm/gup.c:916 [inline] get_user_pages_remote+0x220/0x460 mm/gup.c:1108 process_vm_rw_single_vec mm/process_vm_access.c:113 [inline] process_vm_rw_core.constprop.0+0x400/0xb00 mm/process_vm_access.c:220 process_vm_rw+0x21a/0x250 mm/process_vm_access.c:288 __do_sys_process_vm_writev mm/process_vm_access.c:310 [inline] __se_sys_process_vm_writev mm/process_vm_access.c:305 [inline] __x64_sys_process_vm_writev+0xdf/0x1b0 mm/process_vm_access.c:305 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7ff94cc5b0e9 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007ff94b5d0168 EFLAGS: 00000246 ORIG_RAX: 0000000000000137 RAX: ffffffffffffffda RBX: 00007ff94cd6df60 RCX: 00007ff94cc5b0e9 RDX: 00000000000003de RSI: 0000000020c22000 RDI: 000000000000052c RBP: 00007ff94ccb508d R08: 000000000000030b R09: 0000000000000000 R10: 0000000020c22fa0 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffeb871f3ff R14: 00007ff94b5d0300 R15: 0000000000022000 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 PID: 12069 Comm: kworker/0:1 Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Workqueue: events jump_label_update_timeout RIP: 0010:__read_once_size include/linux/compiler.h:263 [inline] RIP: 0010:csd_lock_wait kernel/smp.c:108 [inline] RIP: 0010:smp_call_function_single+0x1db/0x420 kernel/smp.c:302 Code: 00 e8 09 04 0a 00 48 8b 4c 24 08 48 8b 54 24 10 48 8d 74 24 40 8b 7c 24 1c e8 a1 f9 ff ff 41 89 c5 eb 07 e8 e7 03 0a 00 f3 90 <44> 8b 64 24 58 31 ff 41 83 e4 01 44 89 e6 e8 42 05 0a 00 45 85 e4 RSP: 0018:ffff888096487920 EFLAGS: 00000293 RAX: ffff8880a7f324c0 RBX: 1ffff11012c90f28 RCX: ffffffff8158819e RDX: 0000000000000000 RSI: ffffffff81588189 RDI: 0000000000000005 RBP: ffff8880964879f8 R08: 0000000000000001 R09: 0000000000000000 R10: 0000000000000005 R11: 0000000000000000 R12: 0000000000000001 R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000002 FS: 0000000000000000(0000) GS:ffff8880ba000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000020c22000 CR3: 00000000ab12f000 CR4: 00000000003406f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: smp_call_function_many+0x743/0x8d0 kernel/smp.c:434 smp_call_function kernel/smp.c:492 [inline] on_each_cpu+0x47/0x240 kernel/smp.c:602 text_poke_bp+0xd7/0x1a0 arch/x86/kernel/alternative.c:818 __jump_label_transform+0x2d6/0x460 arch/x86/kernel/jump_label.c:103 arch_jump_label_transform+0x26/0x40 arch/x86/kernel/jump_label.c:111 __jump_label_update+0x1cf/0x230 kernel/jump_label.c:383 jump_label_update kernel/jump_label.c:768 [inline] jump_label_update+0x177/0x310 kernel/jump_label.c:747 __static_key_slow_dec_cpuslocked+0x23d/0x280 kernel/jump_label.c:212 __static_key_slow_dec kernel/jump_label.c:223 [inline] jump_label_update_timeout+0x1b/0x30 kernel/jump_label.c:231 process_one_work+0x864/0x1570 kernel/workqueue.c:2153 worker_thread+0x64c/0x1130 kernel/workqueue.c:2296 kthread+0x33f/0x460 kernel/kthread.c:259 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415 ---------------- Code disassembly (best guess): 0: 48 89 4c 24 20 mov %rcx,0x20(%rsp) 5: 48 c1 ef 03 shr $0x3,%rdi 9: 0f b6 14 17 movzbl (%rdi,%rdx,1),%edx d: 4c 89 c7 mov %r8,%rdi 10: 83 e7 07 and $0x7,%edi 13: 40 38 fe cmp %dil,%sil 16: 40 0f 9e c7 setle %dil 1a: 40 84 f6 test %sil,%sil 1d: 40 0f 95 c6 setne %sil 21: 40 84 f7 test %sil,%dil 24: 0f 85 a8 0b 00 00 jne 0xbd2 * 2a: 48 89 ce mov %rcx,%rsi <-- trapping instruction 2d: 83 e6 07 and $0x7,%esi 30: 40 38 f2 cmp %sil,%dl 33: 40 0f 9e c6 setle %sil 37: 84 d2 test %dl,%dl 39: 0f 95 c2 setne %dl 3c: 40 84 d6 test %dl,%sil 3f: 0f .byte 0xf