watchdog: BUG: soft lockup - CPU#0 stuck for 23s! [syz-executor.0:9558] Modules linked in: irq event stamp: 4538405 hardirqs last enabled at (4538404): [] restore_regs_and_return_to_kernel+0x0/0x2a hardirqs last disabled at (4538405): [] apic_timer_interrupt+0x8e/0xa0 arch/x86/entry/entry_64.S:793 softirqs last enabled at (50666): [] __do_softirq+0x68b/0x9ff kernel/softirq.c:314 softirqs last disabled at (52077): [] invoke_softirq kernel/softirq.c:368 [inline] softirqs last disabled at (52077): [] irq_exit+0x193/0x240 kernel/softirq.c:409 CPU: 0 PID: 9558 Comm: syz-executor.0 Not tainted 4.14.268-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 task: ffff8880726c42c0 task.stack: ffff8880726c8000 RIP: 0010:__dev_queue_xmit+0x758/0x2480 net/core/dev.c:3488 RSP: 0018:ffff8880ba4077a0 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff10 RAX: dffffc0000000000 RBX: 0000000000000000 RCX: 0000000000000000 RDX: 1ffff1101360d260 RSI: 00000000ffffffff RDI: 0000000000000286 RBP: ffff888094c03ac0 R08: ffffffff85c46e0c R09: 00000000000222b9 R10: ffff8880726c4be8 R11: ffff8880726c42c0 R12: ffff88809b069300 R13: ffff88809fb11580 R14: ffff888094c03b98 R15: ffff8880b2e6c040 FS: 00007f3d46353700(0000) GS:ffff8880ba400000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000559bae03c138 CR3: 00000000aa4cc000 CR4: 00000000003406f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: neigh_output include/net/neighbour.h:500 [inline] ip6_finish_output2+0xf48/0x1f10 net/ipv6/ip6_output.c:120 ip6_finish_output+0x5c6/0xd50 net/ipv6/ip6_output.c:192 NF_HOOK_COND include/linux/netfilter.h:239 [inline] ip6_output+0x1c5/0x660 net/ipv6/ip6_output.c:209 dst_output include/net/dst.h:470 [inline] NF_HOOK include/linux/netfilter.h:250 [inline] ndisc_send_skb+0x82a/0x1390 net/ipv6/ndisc.c:483 ndisc_send_rs+0x125/0x630 net/ipv6/ndisc.c:677 addrconf_rs_timer+0x2bb/0x5a0 net/ipv6/addrconf.c:3769 call_timer_fn+0x14a/0x650 kernel/time/timer.c:1280 expire_timers+0x232/0x4d0 kernel/time/timer.c:1319 __run_timers kernel/time/timer.c:1637 [inline] run_timer_softirq+0x1d5/0x5a0 kernel/time/timer.c:1650 __do_softirq+0x24d/0x9ff kernel/softirq.c:288 invoke_softirq kernel/softirq.c:368 [inline] irq_exit+0x193/0x240 kernel/softirq.c:409 exiting_irq arch/x86/include/asm/apic.h:638 [inline] smp_apic_timer_interrupt+0x141/0x5e0 arch/x86/kernel/apic/apic.c:1106 apic_timer_interrupt+0x93/0xa0 arch/x86/entry/entry_64.S:793 RIP: 0010:arch_local_irq_restore arch/x86/include/asm/paravirt.h:779 [inline] RIP: 0010:lock_release+0x41e/0x870 kernel/locking/lockdep.c:4020 RSP: 0018:ffff8880726cf700 EFLAGS: 00000286 ORIG_RAX: ffffffffffffff10 RAX: 1ffffffff11e1279 RBX: 1ffff1100e4d9ee3 RCX: 1ffff1100e4d896e RDX: dffffc0000000000 RSI: 0000000000000002 RDI: 0000000000000286 RBP: ffff8880726c42c0 R08: 0000000000000000 R09: 0000000000000001 R10: 0000000000000000 R11: ffff8880726c42c0 R12: a37942f0b34f8a69 R13: 0000000000000003 R14: ffff8880726c42c0 R15: 0000000000000002 mark_page_accessed+0x412/0x530 mm/swap.c:394 zap_pte_range mm/memory.c:1361 [inline] zap_pmd_range mm/memory.c:1466 [inline] zap_pud_range mm/memory.c:1495 [inline] zap_p4d_range mm/memory.c:1516 [inline] unmap_page_range+0xe5c/0x1ce0 mm/memory.c:1537 unmap_single_vma+0x147/0x2b0 mm/memory.c:1582 unmap_vmas+0x9d/0x160 mm/memory.c:1612 exit_mmap+0x270/0x4d0 mm/mmap.c:3058 __mmput kernel/fork.c:931 [inline] mmput kernel/fork.c:952 [inline] mmput+0xfa/0x420 kernel/fork.c:947 exit_mm kernel/exit.c:548 [inline] do_exit+0x984/0x2850 kernel/exit.c:855 do_group_exit+0x100/0x2e0 kernel/exit.c:965 get_signal+0x38d/0x1ca0 kernel/signal.c:2412 do_signal+0x7c/0x1550 arch/x86/kernel/signal.c:792 exit_to_usermode_loop+0x160/0x200 arch/x86/entry/common.c:160 prepare_exit_to_usermode arch/x86/entry/common.c:199 [inline] syscall_return_slowpath arch/x86/entry/common.c:270 [inline] do_syscall_64+0x4a3/0x640 arch/x86/entry/common.c:297 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x7f3d479de059 RSP: 002b:00007f3d46353218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca RAX: 0000000000000001 RBX: 00007f3d47af0f68 RCX: 00007f3d479de059 RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f3d47af0f6c RBP: 00007f3d47af0f60 R08: 0000001161f13c13 R09: 0000000000000000 R10: 0000000020ffc000 R11: 0000000000000246 R12: 00007f3d47af0f6c R13: 00007ffcfb5c8dff R14: 00007f3d46353300 R15: 0000000000022000 Code: 0f 82 65 0b 00 00 e8 88 ce 90 fb 4c 89 e2 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 80 3c 02 00 0f 85 2e 1a 00 00 49 83 3c 24 00 <0f> 85 d4 08 00 00 e8 5d ce 90 fb 48 8b 04 24 48 8d b8 28 02 00 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 PID: 23 Comm: kworker/1:1 Not tainted 4.14.268-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Workqueue: events netstamp_clear task: ffff8880b5602600 task.stack: ffff8880b5610000 RIP: 0010:rep_nop arch/x86/include/asm/processor.h:646 [inline] RIP: 0010:cpu_relax arch/x86/include/asm/processor.h:651 [inline] RIP: 0010:csd_lock_wait kernel/smp.c:108 [inline] RIP: 0010:smp_call_function_single+0x17a/0x370 kernel/smp.c:302 RSP: 0018:ffff8880b5617a40 EFLAGS: 00000202 RAX: 0000000000000003 RBX: 1ffff11016ac2f4c RCX: 1ffff11016ac05e9 RDX: 0000000000000000 RSI: ffff8880b5602f28 RDI: 0000000000000286 RBP: ffff8880b5617af0 R08: 0000000000000001 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000001 FS: 0000000000000000(0000) GS:ffff8880ba500000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000055f307d0ab08 CR3: 0000000097e2e000 CR4: 00000000003406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: smp_call_function_many+0x60f/0x7a0 kernel/smp.c:434 smp_call_function kernel/smp.c:492 [inline] on_each_cpu+0x40/0x210 kernel/smp.c:602 text_poke_bp+0x90/0x110 arch/x86/kernel/alternative.c:796 __jump_label_transform+0x269/0x300 arch/x86/kernel/jump_label.c:102 arch_jump_label_transform+0x26/0x40 arch/x86/kernel/jump_label.c:110 __jump_label_update+0x113/0x170 kernel/jump_label.c:374 jump_label_update kernel/jump_label.c:741 [inline] jump_label_update+0x140/0x2d0 kernel/jump_label.c:720 static_key_enable_cpuslocked+0xf9/0x170 kernel/jump_label.c:141 static_key_enable+0x16/0x20 kernel/jump_label.c:154 netstamp_clear+0x2e/0x50 net/core/dev.c:1752 process_one_work+0x793/0x14a0 kernel/workqueue.c:2117 worker_thread+0x5cc/0xff0 kernel/workqueue.c:2251 kthread+0x30d/0x420 kernel/kthread.c:232 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:404 Code: 84 89 00 00 00 e8 77 c9 08 00 48 8b 54 24 10 4c 89 e9 8b 7c 24 1c 48 8d 74 24 40 e8 71 fa ff ff 41 89 c4 8b 44 24 58 a8 01 74 0f 51 c9 08 00 f3 90 8b 44 24 58 a8 01 75 f1 e8 42 c9 08 00 e8 ---------------- Code disassembly (best guess): 0: 0f 82 65 0b 00 00 jb 0xb6b 6: e8 88 ce 90 fb callq 0xfb90ce93 b: 4c 89 e2 mov %r12,%rdx e: 48 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%rax 15: fc ff df 18: 48 c1 ea 03 shr $0x3,%rdx 1c: 80 3c 02 00 cmpb $0x0,(%rdx,%rax,1) 20: 0f 85 2e 1a 00 00 jne 0x1a54 26: 49 83 3c 24 00 cmpq $0x0,(%r12) * 2b: 0f 85 d4 08 00 00 jne 0x905 <-- trapping instruction 31: e8 5d ce 90 fb callq 0xfb90ce93 36: 48 8b 04 24 mov (%rsp),%rax 3a: 48 rex.W 3b: 8d .byte 0x8d 3c: b8 .byte 0xb8 3d: 28 02 sub %al,(%rdx)