watchdog: BUG: soft lockup - CPU#0 stuck for 143s! [syz-executor.3:15276] Modules linked in: irq event stamp: 2252401 hardirqs last enabled at (2252400): [] seqcount_lockdep_reader_access include/linux/seqlock.h:104 [inline] hardirqs last enabled at (2252400): [] timekeeping_get_delta kernel/time/timekeeping.c:253 [inline] hardirqs last enabled at (2252400): [] timekeeping_get_ns kernel/time/timekeeping.c:387 [inline] hardirqs last enabled at (2252400): [] ktime_get+0x38a/0x470 kernel/time/timekeeping.c:847 hardirqs last disabled at (2252401): [] sysvec_apic_timer_interrupt+0xb/0xc0 arch/x86/kernel/apic/apic.c:1106 softirqs last enabled at (0): [] copy_process+0x20df/0x7020 kernel/fork.c:2185 softirqs last disabled at (180): [] __dev_queue_xmit+0x1e3/0x3a00 net/core/dev.c:4170 CPU: 0 PID: 15276 Comm: syz-executor.3 Not tainted 5.18.0-next-20220523-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:cake_drop net/sched/sch_cake.c:1514 [inline] RIP: 0010:cake_enqueue+0x13a7/0x39f0 net/sched/sch_cake.c:1903 Code: 31 ff 44 89 e6 e8 29 b4 f3 f9 66 45 85 e4 75 2d 41 bc 00 10 00 00 e8 b8 af f3 f9 44 89 e6 48 89 df 41 83 ec 01 e8 f9 11 ff ff <44> 89 e6 bf ff ff ff ff e8 bc b1 f3 f9 41 83 fc ff 75 d9 e8 91 af RSP: 0018:ffffc9000950f7b0 EFLAGS: 00000246 RAX: 0000000000040000 RBX: ffff888048e482c0 RCX: ffffc900033c2000 RDX: 0000000000040000 RSI: ffffffff87875267 RDI: 0000000000000003 RBP: dffffc0000000000 R08: 0000000000000049 R09: 0000000000000000 R10: ffffffff87866748 R11: 0000000000000000 R12: 0000000000000048 R13: 0000000000000300 R14: ffff888043600000 R15: ffff888048e48000 FS: 00007f931b592700(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000001b2f121000 CR3: 0000000041e94000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: dev_qdisc_enqueue+0x40/0x300 net/core/dev.c:3783 __dev_xmit_skb net/core/dev.c:3872 [inline] __dev_queue_xmit+0x20ba/0x3a00 net/core/dev.c:4219 packet_snd net/packet/af_packet.c:3071 [inline] packet_sendmsg+0x21cb/0x5550 net/packet/af_packet.c:3102 sock_sendmsg_nosec net/socket.c:714 [inline] sock_sendmsg+0xcf/0x120 net/socket.c:734 __sys_sendto+0x21a/0x320 net/socket.c:2119 __do_sys_sendto net/socket.c:2131 [inline] __se_sys_sendto net/socket.c:2127 [inline] __x64_sys_sendto+0xdd/0x1b0 net/socket.c:2127 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x46/0xb0 RIP: 0033:0x7f931a4890e9 ================================ WARNING: inconsistent lock state 5.18.0-next-20220523-syzkaller #0 Not tainted -------------------------------- inconsistent {HARDIRQ-ON-W} -> {IN-HARDIRQ-W} usage. syz-executor.3/15276 [HC1[1]:SC0[2]:HE0:SE0] takes: ffffffff8beb8c78 (vmap_area_lock){?.+.}-{2:2}, at: spin_lock include/linux/spinlock.h:360 [inline] ffffffff8beb8c78 (vmap_area_lock){?.+.}-{2:2}, at: find_vmap_area mm/vmalloc.c:1805 [inline] ffffffff8beb8c78 (vmap_area_lock){?.+.}-{2:2}, at: find_vm_area+0x1c/0x190 mm/vmalloc.c:2525 {HARDIRQ-ON-W} state was registered at: lock_acquire kernel/locking/lockdep.c:5665 [inline] lock_acquire+0x1ab/0x570 kernel/locking/lockdep.c:5630 __raw_spin_lock include/linux/spinlock_api_smp.h:133 [inline] _raw_spin_lock+0x2a/0x40 kernel/locking/spinlock.c:154 spin_lock include/linux/spinlock.h:360 [inline] alloc_vmap_area+0xa49/0x1f00 mm/vmalloc.c:1586 __get_vm_area_node+0x142/0x3f0 mm/vmalloc.c:2453 get_vm_area_caller+0x43/0x50 mm/vmalloc.c:2506 __ioremap_caller.constprop.0+0x292/0x600 arch/x86/mm/ioremap.c:280 acpi_os_ioremap include/acpi/acpi_io.h:13 [inline] acpi_map drivers/acpi/osl.c:296 [inline] acpi_os_map_iomem+0x463/0x550 drivers/acpi/osl.c:355 acpi_tb_acquire_table+0xd8/0x209 drivers/acpi/acpica/tbdata.c:142 acpi_tb_validate_table drivers/acpi/acpica/tbdata.c:317 [inline] acpi_tb_validate_table+0x50/0x8c drivers/acpi/acpica/tbdata.c:308 acpi_tb_verify_temp_table+0x84/0x674 drivers/acpi/acpica/tbdata.c:504 acpi_reallocate_root_table+0x374/0x3e0 drivers/acpi/acpica/tbxface.c:180 acpi_early_init+0x13a/0x438 drivers/acpi/bus.c:1200 start_kernel+0x3cf/0x48f init/main.c:1101 secondary_startup_64_no_verify+0xce/0xdb irq event stamp: 2252401 hardirqs last enabled at (2252400): [] seqcount_lockdep_reader_access include/linux/seqlock.h:104 [inline] hardirqs last enabled at (2252400): [] timekeeping_get_delta kernel/time/timekeeping.c:253 [inline] hardirqs last enabled at (2252400): [] timekeeping_get_ns kernel/time/timekeeping.c:387 [inline] hardirqs last enabled at (2252400): [] ktime_get+0x38a/0x470 kernel/time/timekeeping.c:847 hardirqs last disabled at (2252401): [] sysvec_apic_timer_interrupt+0xb/0xc0 arch/x86/kernel/apic/apic.c:1106 softirqs last enabled at (0): [] copy_process+0x20df/0x7020 kernel/fork.c:2185 softirqs last disabled at (180): [] __dev_queue_xmit+0x1e3/0x3a00 net/core/dev.c:4170 other info that might help us debug this: Possible unsafe locking scenario: CPU0 ---- lock(vmap_area_lock); lock(vmap_area_lock); *** DEADLOCK *** 2 locks held by syz-executor.3/15276: #0: ffffffff8bd87c80 (rcu_read_lock_bh){....}-{1:2}, at: __dev_queue_xmit+0x1e3/0x3a00 net/core/dev.c:4170 #1: ffff888048e48108 (&sch->q.lock){+.-.}-{2:2}, at: spin_lock include/linux/spinlock.h:360 [inline] #1: ffff888048e48108 (&sch->q.lock){+.-.}-{2:2}, at: __dev_xmit_skb net/core/dev.c:3847 [inline] #1: ffff888048e48108 (&sch->q.lock){+.-.}-{2:2}, at: __dev_queue_xmit+0x1faf/0x3a00 net/core/dev.c:4219 stack backtrace: CPU: 0 PID: 15276 Comm: syz-executor.3 Not tainted 5.18.0-next-20220523-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106 print_usage_bug kernel/locking/lockdep.c:3961 [inline] valid_state kernel/locking/lockdep.c:3973 [inline] mark_lock_irq kernel/locking/lockdep.c:4176 [inline] mark_lock.part.0.cold+0x18/0xd8 kernel/locking/lockdep.c:4632 mark_lock kernel/locking/lockdep.c:4596 [inline] mark_usage kernel/locking/lockdep.c:4524 [inline] __lock_acquire+0x14ad/0x5660 kernel/locking/lockdep.c:5007 lock_acquire kernel/locking/lockdep.c:5665 [inline] lock_acquire+0x1ab/0x570 kernel/locking/lockdep.c:5630 __raw_spin_lock include/linux/spinlock_api_smp.h:133 [inline] _raw_spin_lock+0x2a/0x40 kernel/locking/spinlock.c:154 spin_lock include/linux/spinlock.h:360 [inline] find_vmap_area mm/vmalloc.c:1805 [inline] find_vm_area+0x1c/0x190 mm/vmalloc.c:2525 check_heap_object mm/usercopy.c:176 [inline] __check_object_size mm/usercopy.c:252 [inline] __check_object_size+0x1fb/0x7a0 mm/usercopy.c:214 check_object_size include/linux/thread_info.h:199 [inline] __copy_from_user_inatomic include/linux/uaccess.h:62 [inline] copy_from_user_nmi arch/x86/lib/usercopy.c:47 [inline] copy_from_user_nmi+0xcb/0x130 arch/x86/lib/usercopy.c:31 copy_code arch/x86/kernel/dumpstack.c:91 [inline] show_opcodes+0x59/0xb0 arch/x86/kernel/dumpstack.c:121 show_iret_regs+0xd/0x33 arch/x86/kernel/dumpstack.c:149 __show_regs+0x1e/0x60 arch/x86/kernel/process_64.c:74 show_trace_log_lvl+0x25b/0x2ba arch/x86/kernel/dumpstack.c:292 watchdog_timer_fn+0x469/0x5d0 kernel/watchdog.c:435 __run_hrtimer kernel/time/hrtimer.c:1685 [inline] __hrtimer_run_queues+0x1c0/0xe50 kernel/time/hrtimer.c:1749 hrtimer_interrupt+0x31c/0x790 kernel/time/hrtimer.c:1811 local_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1095 [inline] __sysvec_apic_timer_interrupt+0x146/0x530 arch/x86/kernel/apic/apic.c:1112 sysvec_apic_timer_interrupt+0x8e/0xc0 arch/x86/kernel/apic/apic.c:1106 asm_sysvec_apic_timer_interrupt+0x1b/0x20 arch/x86/include/asm/idtentry.h:649 RIP: 0010:cake_drop net/sched/sch_cake.c:1514 [inline] RIP: 0010:cake_enqueue+0x13a7/0x39f0 net/sched/sch_cake.c:1903 Code: 31 ff 44 89 e6 e8 29 b4 f3 f9 66 45 85 e4 75 2d 41 bc 00 10 00 00 e8 b8 af f3 f9 44 89 e6 48 89 df 41 83 ec 01 e8 f9 11 ff ff <44> 89 e6 bf ff ff ff ff e8 bc b1 f3 f9 41 83 fc ff 75 d9 e8 91 af RSP: 0018:ffffc9000950f7b0 EFLAGS: 00000246 RAX: 0000000000040000 RBX: ffff888048e482c0 RCX: ffffc900033c2000 RDX: 0000000000040000 RSI: ffffffff87875267 RDI: 0000000000000003 RBP: dffffc0000000000 R08: 0000000000000049 R09: 0000000000000000 R10: ffffffff87866748 R11: 0000000000000000 R12: 0000000000000048 R13: 0000000000000300 R14: ffff888043600000 R15: ffff888048e48000 dev_qdisc_enqueue+0x40/0x300 net/core/dev.c:3783 __dev_xmit_skb net/core/dev.c:3872 [inline] __dev_queue_xmit+0x20ba/0x3a00 net/core/dev.c:4219 packet_snd net/packet/af_packet.c:3071 [inline] packet_sendmsg+0x21cb/0x5550 net/packet/af_packet.c:3102 sock_sendmsg_nosec net/socket.c:714 [inline] sock_sendmsg+0xcf/0x120 net/socket.c:734 __sys_sendto+0x21a/0x320 net/socket.c:2119 __do_sys_sendto net/socket.c:2131 [inline] __se_sys_sendto net/socket.c:2127 [inline] __x64_sys_sendto+0xdd/0x1b0 net/socket.c:2127 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x46/0xb0 RIP: 0033:0x7f931a4890e9 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f931b592168 EFLAGS: 00000246 ORIG_RAX: 000000000000002c RAX: ffffffffffffffda RBX: 00007f931a59bf60 RCX: 00007f931a4890e9 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 RBP: 00007f931a4e308d R08: 00000000200001c0 R09: 0000000000000014 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffd7f366ddf R14: 00007f931b592300 R15: 0000000000022000 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f931b592168 EFLAGS: 00000246 ORIG_RAX: 000000000000002c RAX: ffffffffffffffda RBX: 00007f931a59bf60 RCX: 00007f931a4890e9 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 RBP: 00007f931a4e308d R08: 00000000200001c0 R09: 0000000000000014 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffd7f366ddf R14: 00007f931b592300 R15: 0000000000022000 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 skipped: idling at native_safe_halt arch/x86/include/asm/irqflags.h:51 [inline] NMI backtrace for cpu 1 skipped: idling at arch_safe_halt arch/x86/include/asm/irqflags.h:89 [inline] NMI backtrace for cpu 1 skipped: idling at acpi_safe_halt drivers/acpi/processor_idle.c:111 [inline] NMI backtrace for cpu 1 skipped: idling at acpi_idle_do_entry+0x1c6/0x250 drivers/acpi/processor_idle.c:554 ---------------- Code disassembly (best guess): 0: 31 ff xor %edi,%edi 2: 44 89 e6 mov %r12d,%esi 5: e8 29 b4 f3 f9 callq 0xf9f3b433 a: 66 45 85 e4 test %r12w,%r12w e: 75 2d jne 0x3d 10: 41 bc 00 10 00 00 mov $0x1000,%r12d 16: e8 b8 af f3 f9 callq 0xf9f3afd3 1b: 44 89 e6 mov %r12d,%esi 1e: 48 89 df mov %rbx,%rdi 21: 41 83 ec 01 sub $0x1,%r12d 25: e8 f9 11 ff ff callq 0xffff1223 * 2a: 44 89 e6 mov %r12d,%esi <-- trapping instruction 2d: bf ff ff ff ff mov $0xffffffff,%edi 32: e8 bc b1 f3 f9 callq 0xf9f3b1f3 37: 41 83 fc ff cmp $0xffffffff,%r12d 3b: 75 d9 jne 0x16 3d: e8 .byte 0xe8 3e: 91 xchg %eax,%ecx 3f: af scas %es:(%rdi),%eax